Lookup for vulnerable packages by Package URL.

GET /api/packages/571158?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
    "type": "deb",
    "namespace": "debian",
    "name": "openjdk-7",
    "version": "7u95-2.6.4-1~deb7u1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "7u181-2.6.14-1~deb8u1",
    "latest_non_vulnerable_version": "7u181-2.6.14-1~deb8u1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38597?format=api",
            "vulnerability_id": "VCID-1pew-7np4-vqfu",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83384",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83317",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83331",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83347",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83346",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8337",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8338",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83395",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83389",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5597"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037040",
                    "reference_id": "1037040",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037040"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386103",
                    "reference_id": "1386103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386103"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93636",
                    "reference_id": "93636",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93636"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3707",
                    "reference_id": "dsa-3707",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3707"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-04",
                    "reference_id": "GLSA-201611-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201611-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/",
                    "reference_id": "ntap-20161019-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20161019-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2079",
                    "reference_id": "RHSA-2016:2079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2079"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html",
                    "reference_id": "RHSA-2016-2079.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2088",
                    "reference_id": "RHSA-2016:2088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2088"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html",
                    "reference_id": "RHSA-2016-2088.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2089",
                    "reference_id": "RHSA-2016:2089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2089"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html",
                    "reference_id": "RHSA-2016-2089.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2090",
                    "reference_id": "RHSA-2016:2090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2090"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html",
                    "reference_id": "RHSA-2016-2090.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2136",
                    "reference_id": "RHSA-2016:2136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2136"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html",
                    "reference_id": "RHSA-2016-2136.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2137",
                    "reference_id": "RHSA-2016:2137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2137"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html",
                    "reference_id": "RHSA-2016-2137.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2138",
                    "reference_id": "RHSA-2016:2138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2138"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html",
                    "reference_id": "RHSA-2016-2138.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2658",
                    "reference_id": "RHSA-2016:2658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2658"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html",
                    "reference_id": "RHSA-2016-2658.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2659",
                    "reference_id": "RHSA-2016:2659",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2659"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html",
                    "reference_id": "RHSA-2016-2659.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0061",
                    "reference_id": "RHSA-2017:0061",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0061"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html",
                    "reference_id": "RHSA-2017-0061.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3121-1/",
                    "reference_id": "USN-3121-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3121-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3130-1/",
                    "reference_id": "USN-3130-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3130-1/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3130-1",
                    "reference_id": "USN-3130-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3130-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3154-1/",
                    "reference_id": "USN-3154-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3154-1/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3154-1",
                    "reference_id": "USN-3154-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3154-1"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-5597"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1pew-7np4-vqfu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31615?format=api",
            "vulnerability_id": "VCID-1x1r-hjrb-6ydb",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10081.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10081.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52614",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52571",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5264",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52607",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52658",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52653",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52703",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52686",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52671",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471711",
                    "reference_id": "1471711",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471711"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99853",
                    "reference_id": "99853",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99853"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10081"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1x1r-hjrb-6ydb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60254?format=api",
            "vulnerability_id": "VCID-1yfj-cdt7-1yhf",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3526.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3526.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83327",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83366",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83311",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8337",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83376",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83351",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83297",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83328",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83361",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97733"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443252",
                    "reference_id": "1443252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443252"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3526",
                    "reference_id": "CVE-2017-3526",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3526"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119",
                    "reference_id": "RHSA-2017:1119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3526"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1yfj-cdt7-1yhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43653?format=api",
            "vulnerability_id": "VCID-27zg-g9hc-4bg1",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2800.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2800.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47455",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54619",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54689",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54711",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54681",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54734",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5473",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54742",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54727",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2800"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4185"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4225"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/103849"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568163",
                    "reference_id": "1568163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568163"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2800",
                    "reference_id": "CVE-2018-2800",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2800"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1188",
                    "reference_id": "RHSA-2018:1188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1191",
                    "reference_id": "RHSA-2018:1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1201",
                    "reference_id": "RHSA-2018:1201",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1201"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1202",
                    "reference_id": "RHSA-2018:1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1203",
                    "reference_id": "RHSA-2018:1203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1204",
                    "reference_id": "RHSA-2018:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1205",
                    "reference_id": "RHSA-2018:1205",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1206",
                    "reference_id": "RHSA-2018:1206",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1270",
                    "reference_id": "RHSA-2018:1270",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1270"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1278",
                    "reference_id": "RHSA-2018:1278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1278"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1721",
                    "reference_id": "RHSA-2018:1721",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1722",
                    "reference_id": "RHSA-2018:1722",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1723",
                    "reference_id": "RHSA-2018:1723",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1724",
                    "reference_id": "RHSA-2018:1724",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1974",
                    "reference_id": "RHSA-2018:1974",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1974"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1975",
                    "reference_id": "RHSA-2018:1975",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1975"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3644-1/",
                    "reference_id": "USN-3644-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3644-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3691-1/",
                    "reference_id": "USN-3691-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:17Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3691-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2800"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-27zg-g9hc-4bg1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43643?format=api",
            "vulnerability_id": "VCID-2jc9-6xf6-63a6",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2641.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2641.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38172",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38081",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38105",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38141",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38123",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38115",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38065",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38195",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37992",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102605",
                    "reference_id": "102605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102605"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534766",
                    "reference_id": "1534766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534766"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2641"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2jc9-6xf6-63a6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38577?format=api",
            "vulnerability_id": "VCID-2krr-m59b-77a7",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91469",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91514",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91516",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91515",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91509",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91503",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9149",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91482",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91475",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91918",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91918"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356971",
                    "reference_id": "1356971",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356971"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3598",
                    "reference_id": "CVE-2016-3598",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3598"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1587",
                    "reference_id": "RHSA-2016:1587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1587"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1588",
                    "reference_id": "RHSA-2016:1588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1589",
                    "reference_id": "RHSA-2016:1589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1589"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-3598"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2krr-m59b-77a7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34962?format=api",
            "vulnerability_id": "VCID-2r75-1ccm-d7aw",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10345.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10345.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73363",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73312",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73321",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73345",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73317",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73354",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73367",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73391",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73371",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101396",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101396"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502858",
                    "reference_id": "1502858",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502858"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10345",
                    "reference_id": "CVE-2017-10345",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10345"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10345"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2r75-1ccm-d7aw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31640?format=api",
            "vulnerability_id": "VCID-3mqp-7bx4-jbhv",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10176.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10176.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85223",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85185",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85207",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85215",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85229",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85226",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85985",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85969",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85957",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472476",
                    "reference_id": "1472476",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472476"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99788",
                    "reference_id": "99788",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99788"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2017-002",
                    "reference_id": "vde-2017-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2017-002"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10176"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3mqp-7bx4-jbhv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31619?format=api",
            "vulnerability_id": "VCID-3xyb-xeyq-n3dm",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10090.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10090.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65549",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65466",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65514",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65542",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65508",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6556",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65571",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6559",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00489",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65577",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471517",
                    "reference_id": "1471517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471517"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99706",
                    "reference_id": "99706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99706"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10090"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3xyb-xeyq-n3dm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31621?format=api",
            "vulnerability_id": "VCID-49z5-4djw-xuav",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10101.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10101.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64501",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64417",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64471",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64502",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64509",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64525",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6454",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64528",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471527",
                    "reference_id": "1471527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471527"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99674",
                    "reference_id": "99674",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99674"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10101"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-49z5-4djw-xuav"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31319?format=api",
            "vulnerability_id": "VCID-4p3u-gdhr-jucj",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87168",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87172",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87113",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87123",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8714",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87137",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87157",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87178",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/81096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/81096"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298957",
                    "reference_id": "1298957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298957"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0402",
                    "reference_id": "CVE-2016-0402",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0402"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0402"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4p3u-gdhr-jucj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31608?format=api",
            "vulnerability_id": "VCID-4ucs-3zp9-rqey",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10053.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10053.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79573",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79524",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79553",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79539",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79568",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79575",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79597",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79581",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471889",
                    "reference_id": "1471889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471889"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99842",
                    "reference_id": "99842",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99842"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2017-002",
                    "reference_id": "vde-2017-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2017-002"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10053"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ucs-3zp9-rqey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43632?format=api",
            "vulnerability_id": "VCID-4zte-62md-kyd8",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2599.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2599.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2318",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23357",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23397",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23185",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23258",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23309",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2333",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23292",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102633",
                    "reference_id": "102633",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102633"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534543",
                    "reference_id": "1534543",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534543"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2599"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4zte-62md-kyd8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31618?format=api",
            "vulnerability_id": "VCID-5jvq-evzj-tfcc",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10089.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10089.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64509",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64528",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6454",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64502",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64525",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64471",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64501",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64417",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471270",
                    "reference_id": "1471270",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471270"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99659",
                    "reference_id": "99659",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99659"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10089"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5jvq-evzj-tfcc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31643?format=api",
            "vulnerability_id": "VCID-5vrc-h4t3-uucb",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10243.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10243.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76363",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76299",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76302",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76332",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76312",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76345",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76358",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76385",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10243"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472666",
                    "reference_id": "1472666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472666"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99827",
                    "reference_id": "99827",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99827"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10243"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5vrc-h4t3-uucb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37024?format=api",
            "vulnerability_id": "VCID-6383-1rzy-9kcr",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59436",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59549",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59568",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59584",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59566",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59553",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59508",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59502",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59533",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906",
                    "reference_id": "1413906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95509",
                    "reference_id": "95509",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95509"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3252"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6383-1rzy-9kcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60251?format=api",
            "vulnerability_id": "VCID-69zc-r9uw-jke5",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3511.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3511.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81687",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81617",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81628",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8165",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81648",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81675",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8168",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.817",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97731"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443007",
                    "reference_id": "1443007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443007"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3511",
                    "reference_id": "CVE-2017-3511",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3511"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220",
                    "reference_id": "RHSA-2017:1220",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221",
                    "reference_id": "RHSA-2017:1221",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3511"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69zc-r9uw-jke5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76694?format=api",
            "vulnerability_id": "VCID-6aph-ab51-2qbt",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2677.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2677.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21184",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21166",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21318",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21374",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21127",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21207",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21268",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21278",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21238",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102656",
                    "reference_id": "102656",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102656"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534288",
                    "reference_id": "1534288",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534288"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2677"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6aph-ab51-2qbt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43648?format=api",
            "vulnerability_id": "VCID-6qtk-xzvb-ubfr",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2795.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2795.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2799",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27931",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2793",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27889",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28031",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27936",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39527",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4185"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4225"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/103847"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567351",
                    "reference_id": "1567351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567351"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2795",
                    "reference_id": "CVE-2018-2795",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1188",
                    "reference_id": "RHSA-2018:1188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1191",
                    "reference_id": "RHSA-2018:1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1201",
                    "reference_id": "RHSA-2018:1201",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1201"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1202",
                    "reference_id": "RHSA-2018:1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1203",
                    "reference_id": "RHSA-2018:1203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1204",
                    "reference_id": "RHSA-2018:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1205",
                    "reference_id": "RHSA-2018:1205",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1206",
                    "reference_id": "RHSA-2018:1206",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1270",
                    "reference_id": "RHSA-2018:1270",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1270"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1278",
                    "reference_id": "RHSA-2018:1278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1278"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1721",
                    "reference_id": "RHSA-2018:1721",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1722",
                    "reference_id": "RHSA-2018:1722",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1723",
                    "reference_id": "RHSA-2018:1723",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1724",
                    "reference_id": "RHSA-2018:1724",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1974",
                    "reference_id": "RHSA-2018:1974",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1974"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1975",
                    "reference_id": "RHSA-2018:1975",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1975"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3644-1/",
                    "reference_id": "USN-3644-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3644-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3691-1/",
                    "reference_id": "USN-3691-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:32Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3691-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2795"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qtk-xzvb-ubfr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43631?format=api",
            "vulnerability_id": "VCID-6xzp-k5m9-ykbc",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2588.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2588.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57055",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5715",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57197",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57216",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57204",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57202",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57151",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57173",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59487",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102661",
                    "reference_id": "102661",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102661"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534299",
                    "reference_id": "1534299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534299"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2588"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xzp-k5m9-ykbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31632?format=api",
            "vulnerability_id": "VCID-7d2e-14yp-pkhq",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10116.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10116.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76125",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76162",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76129",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82007",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8197",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81997",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82005",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82024",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82013",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471738",
                    "reference_id": "1471738",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471738"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99734",
                    "reference_id": "99734",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99734"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2017-002",
                    "reference_id": "vde-2017-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2017-002"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10116"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7d2e-14yp-pkhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37035?format=api",
            "vulnerability_id": "VCID-7ez7-vdry-wbep",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78228",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78285",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78307",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78236",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7825",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78268",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562",
                    "reference_id": "1413562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95525",
                    "reference_id": "95525",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95525"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3289"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ez7-vdry-wbep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30937?format=api",
            "vulnerability_id": "VCID-8edn-xjyj-9fgf",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0687.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0687.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90101",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90104",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9012",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90135",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90141",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9015",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90149",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90144",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160420-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3558"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/86459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/86459"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035596"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2963-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2964-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2964-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2972-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2972-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327749",
                    "reference_id": "1327749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327749"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0687",
                    "reference_id": "CVE-2016-0687",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0687"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-18",
                    "reference_id": "GLSA-201606-18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201606-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0650",
                    "reference_id": "RHSA-2016:0650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0650"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0651",
                    "reference_id": "RHSA-2016:0651",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0651"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0675",
                    "reference_id": "RHSA-2016:0675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0676",
                    "reference_id": "RHSA-2016:0676",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0676"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677",
                    "reference_id": "RHSA-2016:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678",
                    "reference_id": "RHSA-2016:0678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0678"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679",
                    "reference_id": "RHSA-2016:0679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701",
                    "reference_id": "RHSA-2016:0701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702",
                    "reference_id": "RHSA-2016:0702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708",
                    "reference_id": "RHSA-2016:0708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716",
                    "reference_id": "RHSA-2016:0716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0716"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0723",
                    "reference_id": "RHSA-2016:0723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039",
                    "reference_id": "RHSA-2016:1039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1039"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2963-1/",
                    "reference_id": "USN-2963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2963-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2964-1/",
                    "reference_id": "USN-2964-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2964-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2972-1/",
                    "reference_id": "USN-2972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0687"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8edn-xjyj-9fgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43633?format=api",
            "vulnerability_id": "VCID-8f22-4b8p-m3aa",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2602.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2602.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20331",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20126",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20055",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20135",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20193",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20217",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20172",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20273",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20858",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102642",
                    "reference_id": "102642",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102642"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534525",
                    "reference_id": "1534525",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534525"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2602"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8f22-4b8p-m3aa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31638?format=api",
            "vulnerability_id": "VCID-8t17-88c7-xqcz",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10135.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10135.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61005",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60887",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60959",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60989",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60954",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61002",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61018",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61039",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61025",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471871",
                    "reference_id": "1471871",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471871"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99839",
                    "reference_id": "99839",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99839"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2017-002",
                    "reference_id": "vde-2017-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2017-002"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10135"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8t17-88c7-xqcz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34972?format=api",
            "vulnerability_id": "VCID-8vr7-v6d5-gfhw",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10388.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10388.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00544",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67679",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00544",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67754",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00544",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67789",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00544",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67803",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00544",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67713",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00544",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67779",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00544",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67765",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00544",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67733",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10388"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101321"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502038",
                    "reference_id": "1502038",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502038"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10388",
                    "reference_id": "CVE-2017-10388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10388"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10388"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8vr7-v6d5-gfhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34970?format=api",
            "vulnerability_id": "VCID-8y3w-1sev-27d4",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10356.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10356.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.718",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71858",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71876",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7181",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71852",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71802",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71828",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71841",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101413",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101413"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503169",
                    "reference_id": "1503169",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503169"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10356",
                    "reference_id": "CVE-2017-10356",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10356"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:43:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10356"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8y3w-1sev-27d4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34964?format=api",
            "vulnerability_id": "VCID-9bbp-mutu-bqbf",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10347.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10347.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72756",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72703",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7271",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72729",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72704",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72743",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72757",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72781",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72765",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101382",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101382"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502632",
                    "reference_id": "1502632",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502632"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10347",
                    "reference_id": "CVE-2017-10347",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10347"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10347"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9bbp-mutu-bqbf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31622?format=api",
            "vulnerability_id": "VCID-9yds-dpzg-4ba9",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10102.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10102.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71384",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7134",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71348",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71366",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71393",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71417",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71401",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472345",
                    "reference_id": "1472345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472345"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99712",
                    "reference_id": "99712",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99712"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2017-002",
                    "reference_id": "vde-2017-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2017-002"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10102"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yds-dpzg-4ba9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34958?format=api",
            "vulnerability_id": "VCID-a6rq-d1rv-j7dn",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10285.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10285.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68814",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68842",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68871",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68885",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68794",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68862",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68793",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68776",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68843",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101319"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501868",
                    "reference_id": "1501868",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501868"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0.:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0.:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0.:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_worksation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_worksation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_worksation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_worksation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_worksation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_worksation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10285",
                    "reference_id": "CVE-2017-10285",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10285"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:01Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10285"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a6rq-d1rv-j7dn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37019?format=api",
            "vulnerability_id": "VCID-ar8p-z4ww-wuau",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98941",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98953",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98943",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98948",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98945",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98952",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9895",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955",
                    "reference_id": "1413955",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/41145/",
                    "reference_id": "41145",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://www.exploit-db.com/exploits/41145/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95488",
                    "reference_id": "95488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95488"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py",
                    "reference_id": "CVE-2017-3241",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/",
                    "reference_id": "erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3241"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ar8p-z4ww-wuau"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31620?format=api",
            "vulnerability_id": "VCID-awrz-da8u-7ud2",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10096.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10096.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64501",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64417",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64471",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64502",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64509",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64525",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6454",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64528",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471528",
                    "reference_id": "1471528",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471528"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99670",
                    "reference_id": "99670",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99670"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10096"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-awrz-da8u-7ud2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38592?format=api",
            "vulnerability_id": "VCID-b15r-cqd5-rugd",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5554",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83752",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83686",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83699",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83716",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8374",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83746",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83763",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83756",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5554"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037040",
                    "reference_id": "1037040",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037040"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385714",
                    "reference_id": "1385714",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385714"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93637",
                    "reference_id": "93637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93637"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3707",
                    "reference_id": "dsa-3707",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3707"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-04",
                    "reference_id": "GLSA-201611-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201611-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/",
                    "reference_id": "ntap-20161019-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20161019-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2079",
                    "reference_id": "RHSA-2016:2079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2079"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html",
                    "reference_id": "RHSA-2016-2079.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2088",
                    "reference_id": "RHSA-2016:2088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2088"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html",
                    "reference_id": "RHSA-2016-2088.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2089",
                    "reference_id": "RHSA-2016:2089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2089"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html",
                    "reference_id": "RHSA-2016-2089.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2090",
                    "reference_id": "RHSA-2016:2090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2090"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html",
                    "reference_id": "RHSA-2016-2090.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2136",
                    "reference_id": "RHSA-2016:2136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2136"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html",
                    "reference_id": "RHSA-2016-2136.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2137",
                    "reference_id": "RHSA-2016:2137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2137"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html",
                    "reference_id": "RHSA-2016-2137.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2138",
                    "reference_id": "RHSA-2016:2138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2138"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html",
                    "reference_id": "RHSA-2016-2138.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2658",
                    "reference_id": "RHSA-2016:2658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2658"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html",
                    "reference_id": "RHSA-2016-2658.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2659",
                    "reference_id": "RHSA-2016:2659",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2659"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html",
                    "reference_id": "RHSA-2016-2659.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0061",
                    "reference_id": "RHSA-2017:0061",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0061"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html",
                    "reference_id": "RHSA-2017-0061.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3121-1/",
                    "reference_id": "USN-3121-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3121-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3130-1/",
                    "reference_id": "USN-3130-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3130-1/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3130-1",
                    "reference_id": "USN-3130-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3130-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3154-1/",
                    "reference_id": "USN-3154-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3154-1/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3154-1",
                    "reference_id": "USN-3154-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3154-1"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-5554"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b15r-cqd5-rugd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31642?format=api",
            "vulnerability_id": "VCID-b731-snhn-jugu",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10198.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10198.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56375",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56316",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56361",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56385",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56206",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56338",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56319",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5637",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56344",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472320",
                    "reference_id": "1472320",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472320"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99818",
                    "reference_id": "99818",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99818"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2017-002",
                    "reference_id": "vde-2017-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2017-002"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10198"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b731-snhn-jugu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34966?format=api",
            "vulnerability_id": "VCID-bg39-wvte-83c1",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10349.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10349.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72756",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72703",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7271",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72729",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72704",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72743",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72757",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72781",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72765",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101348"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502611",
                    "reference_id": "1502611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502611"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10349",
                    "reference_id": "CVE-2017-10349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10349"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10349"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bg39-wvte-83c1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31627?format=api",
            "vulnerability_id": "VCID-bthw-frhn-wqf6",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10109.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10109.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72011",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71964",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71972",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71991",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71967",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72006",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72018",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72042",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72026",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471670",
                    "reference_id": "1471670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471670"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99847",
                    "reference_id": "99847",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99847"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10109"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bthw-frhn-wqf6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37009?format=api",
            "vulnerability_id": "VCID-c7sa-v6cu-d3ex",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79337",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79378",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7939",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79405",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79382",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79373",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79346",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7933",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7936",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764",
                    "reference_id": "1413764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95521",
                    "reference_id": "95521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95521"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-5547"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c7sa-v6cu-d3ex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60257?format=api",
            "vulnerability_id": "VCID-c9qw-1g2p-qqcr",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3544.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3544.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59471",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59359",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59432",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59457",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59423",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59474",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59487",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59506",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5949",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3544"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://source.android.com/security/bulletin/2017-07-01",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://source.android.com/security/bulletin/2017-07-01"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97745"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443068",
                    "reference_id": "1443068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443068"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3544",
                    "reference_id": "CVE-2017-3544",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3544"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119",
                    "reference_id": "RHSA-2017:1119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220",
                    "reference_id": "RHSA-2017:1220",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221",
                    "reference_id": "RHSA-2017:1221",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222",
                    "reference_id": "RHSA-2017:1222",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3544"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c9qw-1g2p-qqcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38557?format=api",
            "vulnerability_id": "VCID-cp95-73tk-2qhc",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3458.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3458.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85476",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85547",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8555",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85552",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85538",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85528",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85508",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85504",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85488",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3641"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91945"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3077-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3077-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357494",
                    "reference_id": "1357494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357494"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3458",
                    "reference_id": "CVE-2016-3458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3458"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1477",
                    "reference_id": "RHSA-2016:1477",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1776",
                    "reference_id": "RHSA-2016:1776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1776"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3077-1/",
                    "reference_id": "USN-3077-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3077-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-3458"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cp95-73tk-2qhc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31634?format=api",
            "vulnerability_id": "VCID-ctd4-2fps-3bfk",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10118.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10118.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73213",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73152",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73162",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73183",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73157",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73193",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73207",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73232",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472470",
                    "reference_id": "1472470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472470"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99782",
                    "reference_id": "99782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99782"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2017-002",
                    "reference_id": "vde-2017-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2017-002"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10118"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ctd4-2fps-3bfk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31624?format=api",
            "vulnerability_id": "VCID-d4gw-vgm6-qbf3",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10107.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10107.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64525",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64528",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6454",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64502",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64509",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64471",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64501",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64417",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471266",
                    "reference_id": "1471266",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471266"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99719",
                    "reference_id": "99719",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99719"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10107"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d4gw-vgm6-qbf3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43638?format=api",
            "vulnerability_id": "VCID-db1c-8scn-buet",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2633.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2633.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71846",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71818",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71819",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71858",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71869",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71893",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71875",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71827",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7453",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102557",
                    "reference_id": "102557",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102557"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535036",
                    "reference_id": "1535036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535036"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2633"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-db1c-8scn-buet"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31631?format=api",
            "vulnerability_id": "VCID-dtcg-vqnh-kugk",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10115.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10115.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66309",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66237",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66276",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66302",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66272",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6632",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66333",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66353",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6634",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471851",
                    "reference_id": "1471851",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471851"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99774",
                    "reference_id": "99774",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99774"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2017-002",
                    "reference_id": "vde-2017-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2017-002"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10115"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dtcg-vqnh-kugk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37008?format=api",
            "vulnerability_id": "VCID-e2zb-3859-qfe6",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78586",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78536",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78543",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78573",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78556",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78582",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78588",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78612",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78594",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911",
                    "reference_id": "1413911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95506",
                    "reference_id": "95506",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95506"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-5546"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e2zb-3859-qfe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38570?format=api",
            "vulnerability_id": "VCID-e8nm-ey3v-pfga",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3550.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3550.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83213",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83282",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83286",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83292",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83267",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83243",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83244",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83229",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3641"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91951"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3077-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3077-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357506",
                    "reference_id": "1357506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357506"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3550",
                    "reference_id": "CVE-2016-3550",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3550"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1477",
                    "reference_id": "RHSA-2016:1477",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1776",
                    "reference_id": "RHSA-2016:1776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1776"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3077-1/",
                    "reference_id": "USN-3077-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3077-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-3550"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e8nm-ey3v-pfga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30938?format=api",
            "vulnerability_id": "VCID-ejfg-8n1t-53b9",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0695.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0695.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8633",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8634",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86358",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8636",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86378",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86388",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86401",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.864",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86395",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10159"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160420-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3558"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/86438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/86438"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035596"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2963-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2964-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2964-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2972-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2972-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328022",
                    "reference_id": "1328022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328022"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:icedtea7:*:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0695",
                    "reference_id": "CVE-2016-0695",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0695"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-18",
                    "reference_id": "GLSA-201606-18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:58:14Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201606-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0650",
                    "reference_id": "RHSA-2016:0650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0650"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0651",
                    "reference_id": "RHSA-2016:0651",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0651"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0675",
                    "reference_id": "RHSA-2016:0675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0676",
                    "reference_id": "RHSA-2016:0676",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0676"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677",
                    "reference_id": "RHSA-2016:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678",
                    "reference_id": "RHSA-2016:0678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0678"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679",
                    "reference_id": "RHSA-2016:0679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0723",
                    "reference_id": "RHSA-2016:0723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0723"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2963-1/",
                    "reference_id": "USN-2963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2963-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2964-1/",
                    "reference_id": "USN-2964-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2964-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2972-1/",
                    "reference_id": "USN-2972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0695"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ejfg-8n1t-53b9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43657?format=api",
            "vulnerability_id": "VCID-enkm-4xpy-6bfp",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2815.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2815.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71876",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71819",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71828",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71847",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7182",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71859",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7187",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00693",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71894",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4185"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4225"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/103848"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567537",
                    "reference_id": "1567537",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567537"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:-:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:-:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:-:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2815",
                    "reference_id": "CVE-2018-2815",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2815"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1188",
                    "reference_id": "RHSA-2018:1188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1191",
                    "reference_id": "RHSA-2018:1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1201",
                    "reference_id": "RHSA-2018:1201",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1201"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1202",
                    "reference_id": "RHSA-2018:1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1203",
                    "reference_id": "RHSA-2018:1203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1204",
                    "reference_id": "RHSA-2018:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1205",
                    "reference_id": "RHSA-2018:1205",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1206",
                    "reference_id": "RHSA-2018:1206",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1270",
                    "reference_id": "RHSA-2018:1270",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1270"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1278",
                    "reference_id": "RHSA-2018:1278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1278"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3644-1/",
                    "reference_id": "USN-3644-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3644-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3691-1/",
                    "reference_id": "USN-3691-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:32Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3691-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2815"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-enkm-4xpy-6bfp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60256?format=api",
            "vulnerability_id": "VCID-fsu1-jy1q-qkh1",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3539.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3539.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72681",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7263",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72638",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72655",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72632",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72672",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72685",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72708",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00731",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72691",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97752",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97752"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443097",
                    "reference_id": "1443097",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443097"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3539",
                    "reference_id": "CVE-2017-3539",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3539"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119",
                    "reference_id": "RHSA-2017:1119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220",
                    "reference_id": "RHSA-2017:1220",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221",
                    "reference_id": "RHSA-2017:1221",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222",
                    "reference_id": "RHSA-2017:1222",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3539"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fsu1-jy1q-qkh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60255?format=api",
            "vulnerability_id": "VCID-ft81-49v3-a7cr",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3533.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3533.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70782",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70721",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70737",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70755",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7073",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70775",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70791",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70813",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70798",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97740"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443083",
                    "reference_id": "1443083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443083"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3533",
                    "reference_id": "CVE-2017-3533",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3533"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119",
                    "reference_id": "RHSA-2017:1119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220",
                    "reference_id": "RHSA-2017:1220",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221",
                    "reference_id": "RHSA-2017:1221",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222",
                    "reference_id": "RHSA-2017:1222",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3533"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ft81-49v3-a7cr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37028?format=api",
            "vulnerability_id": "VCID-ftnn-eurn-wydw",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74937",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74981",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74991",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75012",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7499",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74977",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74943",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74968",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653",
                    "reference_id": "1413653",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95566",
                    "reference_id": "95566",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95566"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3261"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnn-eurn-wydw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43649?format=api",
            "vulnerability_id": "VCID-gceb-nxww-w3f5",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2796.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2796.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52552",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52617",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52631",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52648",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52585",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52558",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52512",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52597",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52603",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2796"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4185"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4225"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/103868"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567546",
                    "reference_id": "1567546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567546"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2796",
                    "reference_id": "CVE-2018-2796",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2796"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1188",
                    "reference_id": "RHSA-2018:1188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1191",
                    "reference_id": "RHSA-2018:1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1201",
                    "reference_id": "RHSA-2018:1201",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1201"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1202",
                    "reference_id": "RHSA-2018:1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1204",
                    "reference_id": "RHSA-2018:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1206",
                    "reference_id": "RHSA-2018:1206",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1270",
                    "reference_id": "RHSA-2018:1270",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1270"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1278",
                    "reference_id": "RHSA-2018:1278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1278"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1721",
                    "reference_id": "RHSA-2018:1721",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1722",
                    "reference_id": "RHSA-2018:1722",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1723",
                    "reference_id": "RHSA-2018:1723",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1724",
                    "reference_id": "RHSA-2018:1724",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1974",
                    "reference_id": "RHSA-2018:1974",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1974"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1975",
                    "reference_id": "RHSA-2018:1975",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1975"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3644-1/",
                    "reference_id": "USN-3644-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3644-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3691-1/",
                    "reference_id": "USN-3691-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3691-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2796"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gceb-nxww-w3f5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43637?format=api",
            "vulnerability_id": "VCID-gfk8-e7xe-17fk",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2629.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2629.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44529",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44532",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4453",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44561",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44539",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4455",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44459",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102615",
                    "reference_id": "102615",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102615"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534625",
                    "reference_id": "1534625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534625"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:46Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2629"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gfk8-e7xe-17fk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31325?format=api",
            "vulnerability_id": "VCID-gted-bme5-r7gf",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92461",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92463",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9242",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92426",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92435",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92437",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92454",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9246",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0494"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298906",
                    "reference_id": "1298906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298906"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0494",
                    "reference_id": "CVE-2016-0494",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0494"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3227-1/",
                    "reference_id": "USN-3227-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3227-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0494"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gted-bme5-r7gf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43645?format=api",
            "vulnerability_id": "VCID-htzk-vgn5-m7ak",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2663.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2663.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21184",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21166",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21318",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21374",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21127",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21207",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21268",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21278",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21238",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102662",
                    "reference_id": "102662",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102662"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534296",
                    "reference_id": "1534296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534296"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2663"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-htzk-vgn5-m7ak"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37027?format=api",
            "vulnerability_id": "VCID-hvzr-km7c-cqgz",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3260.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3260.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83177",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83193",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83243",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83207",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83206",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83253",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01903",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83247",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414562",
                    "reference_id": "1414562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414562"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95576",
                    "reference_id": "95576",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95576"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3260"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvzr-km7c-cqgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31617?format=api",
            "vulnerability_id": "VCID-hxb8-qu7h-8bdu",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10087.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10087.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64501",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64417",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64471",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64502",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64509",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64525",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6454",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64528",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471521",
                    "reference_id": "1471521",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471521"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99703",
                    "reference_id": "99703",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99703"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10087"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hxb8-qu7h-8bdu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31641?format=api",
            "vulnerability_id": "VCID-j5hg-xy6j-rkgv",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10193.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10193.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65629",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65678",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65708",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65674",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65725",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65737",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65758",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65744",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471715",
                    "reference_id": "1471715",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471715"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99854",
                    "reference_id": "99854",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99854"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10193"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j5hg-xy6j-rkgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30941?format=api",
            "vulnerability_id": "VCID-jccp-8k75-xkhn",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3427.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3427.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.94019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99896",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.94019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99898",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.94019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.94019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99895",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3427"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10159"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r5f48b16573a11fdf0b557cc3d1d71423ecde8ee771c29f32334fa948%40%3Cdev.cassandra.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r5f48b16573a11fdf0b557cc3d1d71423ecde8ee771c29f32334fa948%40%3Cdev.cassandra.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rc3abf40b06c511d5693baf707d6444bf7745e6a1e343e6f530a12258%40%3Cuser.cassandra.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rc3abf40b06c511d5693baf707d6444bf7745e6a1e343e6f530a12258%40%3Cuser.cassandra.apache.org%3E"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160420-0001/"
                },
                {
                    "reference_url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3427"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3558"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2020/08/31/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2020/08/31/1"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/86421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/86421"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035596"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037331"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2963-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2964-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2964-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2972-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2972-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328210",
                    "reference_id": "1328210",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328210"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3427",
                    "reference_id": "CVE-2016-3427",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3427"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-18",
                    "reference_id": "GLSA-201606-18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201606-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0650",
                    "reference_id": "RHSA-2016:0650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0650"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0651",
                    "reference_id": "RHSA-2016:0651",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0651"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0675",
                    "reference_id": "RHSA-2016:0675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0676",
                    "reference_id": "RHSA-2016:0676",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0676"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677",
                    "reference_id": "RHSA-2016:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678",
                    "reference_id": "RHSA-2016:0678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0678"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679",
                    "reference_id": "RHSA-2016:0679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701",
                    "reference_id": "RHSA-2016:0701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702",
                    "reference_id": "RHSA-2016:0702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708",
                    "reference_id": "RHSA-2016:0708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716",
                    "reference_id": "RHSA-2016:0716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0716"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0723",
                    "reference_id": "RHSA-2016:0723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039",
                    "reference_id": "RHSA-2016:1039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1039"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2963-1/",
                    "reference_id": "USN-2963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2963-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2964-1/",
                    "reference_id": "USN-2964-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2964-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2972-1/",
                    "reference_id": "USN-2972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-3427"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jccp-8k75-xkhn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43646?format=api",
            "vulnerability_id": "VCID-jh9n-h2qn-pqh3",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2790.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2790.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46958",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46901",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46937",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46954",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46902",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46956",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46953",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46977",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46951",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4185"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4225"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103877",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/103877"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568515",
                    "reference_id": "1568515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568515"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2790",
                    "reference_id": "CVE-2018-2790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2790"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1188",
                    "reference_id": "RHSA-2018:1188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1191",
                    "reference_id": "RHSA-2018:1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1201",
                    "reference_id": "RHSA-2018:1201",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1201"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1202",
                    "reference_id": "RHSA-2018:1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1203",
                    "reference_id": "RHSA-2018:1203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1204",
                    "reference_id": "RHSA-2018:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1205",
                    "reference_id": "RHSA-2018:1205",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1206",
                    "reference_id": "RHSA-2018:1206",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1270",
                    "reference_id": "RHSA-2018:1270",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1270"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1278",
                    "reference_id": "RHSA-2018:1278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1278"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1721",
                    "reference_id": "RHSA-2018:1721",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1722",
                    "reference_id": "RHSA-2018:1722",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1723",
                    "reference_id": "RHSA-2018:1723",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1724",
                    "reference_id": "RHSA-2018:1724",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1974",
                    "reference_id": "RHSA-2018:1974",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1974"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1975",
                    "reference_id": "RHSA-2018:1975",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1975"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3644-1/",
                    "reference_id": "USN-3644-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3644-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3691-1/",
                    "reference_id": "USN-3691-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:24Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3691-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2790"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jh9n-h2qn-pqh3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31322?format=api",
            "vulnerability_id": "VCID-jj9j-kwv8-byba",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89689",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89696",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89648",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89651",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89665",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89668",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89684",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8969",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89698",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/81118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/81118"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299385",
                    "reference_id": "1299385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299385"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0466",
                    "reference_id": "CVE-2016-0466",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0466"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0466"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jj9j-kwv8-byba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37015?format=api",
            "vulnerability_id": "VCID-k3pa-xdxn-ubbg",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69191",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69256",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69285",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.693",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69259",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69207",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69209",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69227",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717",
                    "reference_id": "1413717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95563",
                    "reference_id": "95563",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95563"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3231"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k3pa-xdxn-ubbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43647?format=api",
            "vulnerability_id": "VCID-k57c-bcn4-zbat",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2794.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2794.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14337",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14374",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14459",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14528",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14421",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14476",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14426",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14389",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19885",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4185"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4225"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/103817"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567126",
                    "reference_id": "1567126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567126"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2794",
                    "reference_id": "CVE-2018-2794",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2794"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1188",
                    "reference_id": "RHSA-2018:1188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1191",
                    "reference_id": "RHSA-2018:1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1201",
                    "reference_id": "RHSA-2018:1201",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1201"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1202",
                    "reference_id": "RHSA-2018:1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1203",
                    "reference_id": "RHSA-2018:1203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1204",
                    "reference_id": "RHSA-2018:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1205",
                    "reference_id": "RHSA-2018:1205",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1206",
                    "reference_id": "RHSA-2018:1206",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1270",
                    "reference_id": "RHSA-2018:1270",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1270"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1278",
                    "reference_id": "RHSA-2018:1278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1278"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1721",
                    "reference_id": "RHSA-2018:1721",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1722",
                    "reference_id": "RHSA-2018:1722",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1723",
                    "reference_id": "RHSA-2018:1723",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1724",
                    "reference_id": "RHSA-2018:1724",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1974",
                    "reference_id": "RHSA-2018:1974",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1974"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1975",
                    "reference_id": "RHSA-2018:1975",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1975"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3644-1/",
                    "reference_id": "USN-3644-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3644-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3691-1/",
                    "reference_id": "USN-3691-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:44Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3691-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2794"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k57c-bcn4-zbat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34955?format=api",
            "vulnerability_id": "VCID-kejc-5261-t7c6",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10281.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10281.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72756",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72703",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7271",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72729",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72704",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72743",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72757",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72781",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72765",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101378"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502649",
                    "reference_id": "1502649",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502649"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10281",
                    "reference_id": "CVE-2017-10281",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10281"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10281"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kejc-5261-t7c6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43627?format=api",
            "vulnerability_id": "VCID-kw91-zqtv-7kap",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2579.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2579.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29288",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29114",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29213",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29238",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29207",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29167",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29163",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29103",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102663",
                    "reference_id": "102663",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102663"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534298",
                    "reference_id": "1534298",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534298"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2579"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kw91-zqtv-7kap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34965?format=api",
            "vulnerability_id": "VCID-m84d-m2tw-tyet",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10348.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10348.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72756",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72703",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7271",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72729",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72704",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72743",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72757",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72781",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72765",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101354",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101354"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502629",
                    "reference_id": "1502629",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502629"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10348",
                    "reference_id": "CVE-2017-10348",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10348"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:26Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10348"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m84d-m2tw-tyet"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38595?format=api",
            "vulnerability_id": "VCID-n1wv-bkbb-gugt",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5573",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86201",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86136",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86147",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86162",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86181",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86193",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86207",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86205",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5573"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037040",
                    "reference_id": "1037040",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037040"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385544",
                    "reference_id": "1385544",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385544"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93628",
                    "reference_id": "93628",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93628"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3707",
                    "reference_id": "dsa-3707",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3707"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-04",
                    "reference_id": "GLSA-201611-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201611-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/",
                    "reference_id": "ntap-20161019-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20161019-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2079",
                    "reference_id": "RHSA-2016:2079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2079"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html",
                    "reference_id": "RHSA-2016-2079.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2088",
                    "reference_id": "RHSA-2016:2088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2088"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html",
                    "reference_id": "RHSA-2016-2088.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2089",
                    "reference_id": "RHSA-2016:2089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2089"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html",
                    "reference_id": "RHSA-2016-2089.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2090",
                    "reference_id": "RHSA-2016:2090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2090"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html",
                    "reference_id": "RHSA-2016-2090.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2136",
                    "reference_id": "RHSA-2016:2136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2136"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html",
                    "reference_id": "RHSA-2016-2136.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2137",
                    "reference_id": "RHSA-2016:2137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2137"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html",
                    "reference_id": "RHSA-2016-2137.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2138",
                    "reference_id": "RHSA-2016:2138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2138"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html",
                    "reference_id": "RHSA-2016-2138.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2658",
                    "reference_id": "RHSA-2016:2658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2658"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html",
                    "reference_id": "RHSA-2016-2658.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2659",
                    "reference_id": "RHSA-2016:2659",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2659"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html",
                    "reference_id": "RHSA-2016-2659.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0061",
                    "reference_id": "RHSA-2017:0061",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0061"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html",
                    "reference_id": "RHSA-2017-0061.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3121-1/",
                    "reference_id": "USN-3121-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3121-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3130-1/",
                    "reference_id": "USN-3130-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3130-1/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3130-1",
                    "reference_id": "USN-3130-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3130-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3154-1/",
                    "reference_id": "USN-3154-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3154-1/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3154-1",
                    "reference_id": "USN-3154-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3154-1"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-5573"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1wv-bkbb-gugt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34967?format=api",
            "vulnerability_id": "VCID-n46g-eb9y-9bds",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10350.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10350.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72756",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72703",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7271",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72729",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72704",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72743",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72757",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72781",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72765",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101341",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101341"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502640",
                    "reference_id": "1502640",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502640"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10350",
                    "reference_id": "CVE-2017-10350",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10350"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10350"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n46g-eb9y-9bds"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43651?format=api",
            "vulnerability_id": "VCID-nwvg-gjkx-8khw",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2798.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2798.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.394",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39585",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39555",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39571",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39581",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39562",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39543",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39527",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.395",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2798"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4185"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4225"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103841",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/103841"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567543",
                    "reference_id": "1567543",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567543"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2798",
                    "reference_id": "CVE-2018-2798",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2798"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1188",
                    "reference_id": "RHSA-2018:1188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1191",
                    "reference_id": "RHSA-2018:1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1201",
                    "reference_id": "RHSA-2018:1201",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1201"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1202",
                    "reference_id": "RHSA-2018:1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1203",
                    "reference_id": "RHSA-2018:1203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1204",
                    "reference_id": "RHSA-2018:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1205",
                    "reference_id": "RHSA-2018:1205",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1206",
                    "reference_id": "RHSA-2018:1206",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1270",
                    "reference_id": "RHSA-2018:1270",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1270"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1278",
                    "reference_id": "RHSA-2018:1278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1278"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1721",
                    "reference_id": "RHSA-2018:1721",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1722",
                    "reference_id": "RHSA-2018:1722",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1723",
                    "reference_id": "RHSA-2018:1723",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1724",
                    "reference_id": "RHSA-2018:1724",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1974",
                    "reference_id": "RHSA-2018:1974",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1974"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1975",
                    "reference_id": "RHSA-2018:1975",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1975"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3644-1/",
                    "reference_id": "USN-3644-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3644-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3691-1/",
                    "reference_id": "USN-3691-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3691-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2798"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nwvg-gjkx-8khw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34954?format=api",
            "vulnerability_id": "VCID-pdv6-xmdk-d3hy",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10274.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10274.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69633",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69612",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69663",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6968",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69702",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69687",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69673",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:H/Au:N/C:C/I:C/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101333"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502053",
                    "reference_id": "1502053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502053"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10274",
                    "reference_id": "CVE-2017-10274",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10274"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:02Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10274"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pdv6-xmdk-d3hy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31625?format=api",
            "vulnerability_id": "VCID-ps35-n8f5-uqcr",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10108.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10108.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72011",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71964",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71972",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71991",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71967",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72006",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72018",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72042",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72026",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471888",
                    "reference_id": "1471888",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471888"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99846",
                    "reference_id": "99846",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99846"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2017-002",
                    "reference_id": "vde-2017-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2017-002"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10108"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ps35-n8f5-uqcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31628?format=api",
            "vulnerability_id": "VCID-qfam-11ye-tkd8",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10110.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10110.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64501",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64417",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64471",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64502",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64509",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64525",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6454",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64528",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471523",
                    "reference_id": "1471523",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471523"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99643",
                    "reference_id": "99643",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99643"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10110"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qfam-11ye-tkd8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37012?format=api",
            "vulnerability_id": "VCID-qs1s-6yjm-jye5",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72038",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71993",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7202",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71996",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72035",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72047",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7207",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72054",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037798",
                    "reference_id": "1037798",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037798"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882",
                    "reference_id": "1413882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882"
                },
                {
                    "reference_url": "https://source.android.com/security/bulletin/2017-02-01.html",
                    "reference_id": "2017-02-01.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://source.android.com/security/bulletin/2017-02-01.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95512",
                    "reference_id": "95512",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95512"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-5552"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs1s-6yjm-jye5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39980?format=api",
            "vulnerability_id": "VCID-qup9-qy11-fqhe",
            "summary": "Multiple vulnerabilities have been found in mbed TLS, the worst of\n    which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81189",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81125",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81184",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8119",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8121",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81196",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81134",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81157",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7575"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1158489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1158489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950"
                },
                {
                    "reference_url": "https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160225-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20160225-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3436",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3436"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3437"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3457"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3491"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3688",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3688"
                },
                {
                    "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-150.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-150.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79684",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79684"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034541"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1036467"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2863-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2863-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2864-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2864-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2865-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2865-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2866-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2866-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2904-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2904-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289841",
                    "reference_id": "1289841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289841"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7575",
                    "reference_id": "CVE-2015-7575",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7575"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-46",
                    "reference_id": "GLSA-201701-46",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-46"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-18",
                    "reference_id": "GLSA-201706-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-18"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201801-15",
                    "reference_id": "GLSA-201801-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201801-15"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-150",
                    "reference_id": "mfsa2015-150",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-150"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0007",
                    "reference_id": "RHSA-2016:0007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0008",
                    "reference_id": "RHSA-2016:0008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0008"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0012",
                    "reference_id": "RHSA-2016:0012",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0012"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2863-1/",
                    "reference_id": "USN-2863-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2863-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2864-1/",
                    "reference_id": "USN-2864-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2864-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2865-1/",
                    "reference_id": "USN-2865-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2865-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2866-1/",
                    "reference_id": "USN-2866-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2866-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2904-1/",
                    "reference_id": "USN-2904-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2904-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2015-7575"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qup9-qy11-fqhe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38567?format=api",
            "vulnerability_id": "VCID-r1ff-e1sf-eqeg",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3508.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3508.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92768",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92775",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9278",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92777",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92786",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92791",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92795",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3641"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91972",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91972"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3077-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3077-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357015",
                    "reference_id": "1357015",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357015"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3508",
                    "reference_id": "CVE-2016-3508",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3508"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1477",
                    "reference_id": "RHSA-2016:1477",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1776",
                    "reference_id": "RHSA-2016:1776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1776"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3077-1/",
                    "reference_id": "USN-3077-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3077-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-3508"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ff-e1sf-eqeg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76696?format=api",
            "vulnerability_id": "VCID-r4tw-jgd7-euet",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2678.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2678.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21127",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21184",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21238",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21318",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21278",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21268",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21166",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21374",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21207",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2678"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102659",
                    "reference_id": "102659",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102659"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534263",
                    "reference_id": "1534263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534263"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2678"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r4tw-jgd7-euet"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30936?format=api",
            "vulnerability_id": "VCID-r7cu-ewk5-pygd",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0686.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0686.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90101",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90104",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9012",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90135",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90141",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9015",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90149",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90144",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160420-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3558"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/86473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/86473"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035596"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2963-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2964-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2964-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2972-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2972-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327743",
                    "reference_id": "1327743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327743"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0686",
                    "reference_id": "CVE-2016-0686",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0686"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-18",
                    "reference_id": "GLSA-201606-18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201606-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0650",
                    "reference_id": "RHSA-2016:0650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0650"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0651",
                    "reference_id": "RHSA-2016:0651",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0651"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0675",
                    "reference_id": "RHSA-2016:0675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0676",
                    "reference_id": "RHSA-2016:0676",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0676"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677",
                    "reference_id": "RHSA-2016:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678",
                    "reference_id": "RHSA-2016:0678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0678"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679",
                    "reference_id": "RHSA-2016:0679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701",
                    "reference_id": "RHSA-2016:0701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702",
                    "reference_id": "RHSA-2016:0702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708",
                    "reference_id": "RHSA-2016:0708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716",
                    "reference_id": "RHSA-2016:0716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0716"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0723",
                    "reference_id": "RHSA-2016:0723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039",
                    "reference_id": "RHSA-2016:1039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1039"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2963-1/",
                    "reference_id": "USN-2963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2963-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2964-1/",
                    "reference_id": "USN-2964-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2964-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2972-1/",
                    "reference_id": "USN-2972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0686"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7cu-ewk5-pygd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43650?format=api",
            "vulnerability_id": "VCID-rf14-48vb-w7gh",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2797.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2797.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27931",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27936",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2799",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27889",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28031",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2793",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39527",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4185"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4225"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/103846"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567545",
                    "reference_id": "1567545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567545"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2797",
                    "reference_id": "CVE-2018-2797",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2797"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1188",
                    "reference_id": "RHSA-2018:1188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1191",
                    "reference_id": "RHSA-2018:1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1201",
                    "reference_id": "RHSA-2018:1201",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1201"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1202",
                    "reference_id": "RHSA-2018:1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1203",
                    "reference_id": "RHSA-2018:1203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1204",
                    "reference_id": "RHSA-2018:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1205",
                    "reference_id": "RHSA-2018:1205",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1206",
                    "reference_id": "RHSA-2018:1206",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1270",
                    "reference_id": "RHSA-2018:1270",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1270"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1278",
                    "reference_id": "RHSA-2018:1278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1278"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1721",
                    "reference_id": "RHSA-2018:1721",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1722",
                    "reference_id": "RHSA-2018:1722",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1723",
                    "reference_id": "RHSA-2018:1723",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1724",
                    "reference_id": "RHSA-2018:1724",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1974",
                    "reference_id": "RHSA-2018:1974",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1974"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1975",
                    "reference_id": "RHSA-2018:1975",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1975"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3644-1/",
                    "reference_id": "USN-3644-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3644-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3691-1/",
                    "reference_id": "USN-3691-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:35Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3691-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2797"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rf14-48vb-w7gh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43656?format=api",
            "vulnerability_id": "VCID-rgf4-rwp5-dqd7",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2814.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2814.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63776",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63827",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63842",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63828",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6381",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63759",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63802",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63715",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4185"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4225"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/103798"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567121",
                    "reference_id": "1567121",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567121"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2814",
                    "reference_id": "CVE-2018-2814",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2814"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1188",
                    "reference_id": "RHSA-2018:1188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1191",
                    "reference_id": "RHSA-2018:1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1201",
                    "reference_id": "RHSA-2018:1201",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1201"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1202",
                    "reference_id": "RHSA-2018:1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1203",
                    "reference_id": "RHSA-2018:1203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1203"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1204",
                    "reference_id": "RHSA-2018:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1205",
                    "reference_id": "RHSA-2018:1205",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1206",
                    "reference_id": "RHSA-2018:1206",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1270",
                    "reference_id": "RHSA-2018:1270",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1270"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1278",
                    "reference_id": "RHSA-2018:1278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1278"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3644-1/",
                    "reference_id": "USN-3644-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3644-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3691-1/",
                    "reference_id": "USN-3691-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:38Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3691-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2814"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgf4-rwp5-dqd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34971?format=api",
            "vulnerability_id": "VCID-rvvx-ed8u-auc5",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10357.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10357.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72756",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72703",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7271",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72729",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72704",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72743",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72757",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72781",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72765",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101355"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502614",
                    "reference_id": "1502614",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502614"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10357",
                    "reference_id": "CVE-2017-10357",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10357"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:21Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10357"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rvvx-ed8u-auc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38596?format=api",
            "vulnerability_id": "VCID-rxem-v2fe-jfde",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5582.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5582.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88857",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88801",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88809",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88825",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88828",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88845",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8885",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88862",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037040",
                    "reference_id": "1037040",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037040"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385402",
                    "reference_id": "1385402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385402"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93623",
                    "reference_id": "93623",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93623"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3707",
                    "reference_id": "dsa-3707",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3707"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-04",
                    "reference_id": "GLSA-201611-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201611-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/",
                    "reference_id": "ntap-20161019-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20161019-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2079",
                    "reference_id": "RHSA-2016:2079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2079"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html",
                    "reference_id": "RHSA-2016-2079.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2088",
                    "reference_id": "RHSA-2016:2088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2088"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html",
                    "reference_id": "RHSA-2016-2088.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2089",
                    "reference_id": "RHSA-2016:2089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2089"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html",
                    "reference_id": "RHSA-2016-2089.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2090",
                    "reference_id": "RHSA-2016:2090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2090"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html",
                    "reference_id": "RHSA-2016-2090.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2658",
                    "reference_id": "RHSA-2016:2658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2658"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html",
                    "reference_id": "RHSA-2016-2658.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0061",
                    "reference_id": "RHSA-2017:0061",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0061"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html",
                    "reference_id": "RHSA-2017-0061.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3121-1/",
                    "reference_id": "USN-3121-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3121-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3130-1/",
                    "reference_id": "USN-3130-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3130-1/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3130-1",
                    "reference_id": "USN-3130-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3130-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3154-1/",
                    "reference_id": "USN-3154-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3154-1/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3154-1",
                    "reference_id": "USN-3154-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:40Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3154-1"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-5582"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rxem-v2fe-jfde"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37010?format=api",
            "vulnerability_id": "VCID-snqh-ebq3-hubn",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67116",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67044",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67082",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67106",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67129",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67142",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67161",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67147",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920",
                    "reference_id": "1413920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95559",
                    "reference_id": "95559",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95559"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-5548"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snqh-ebq3-hubn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38564?format=api",
            "vulnerability_id": "VCID-ssf2-jqkb-3qgw",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3500.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3500.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9365",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93613",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93623",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93631",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93633",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93642",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93644",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93649",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3641"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3077-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3077-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357008",
                    "reference_id": "1357008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357008"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3500",
                    "reference_id": "CVE-2016-3500",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3500"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1477",
                    "reference_id": "RHSA-2016:1477",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1776",
                    "reference_id": "RHSA-2016:1776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1776"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3077-1/",
                    "reference_id": "USN-3077-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3077-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-3500"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ssf2-jqkb-3qgw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50861?format=api",
            "vulnerability_id": "VCID-taqg-ukr5-ybbk",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81605",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81668",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81675",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81688",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81667",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81663",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81617",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81635",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81638",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160420-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3558"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/86449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/86449"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035596"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2963-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328059",
                    "reference_id": "1328059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328059"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3426",
                    "reference_id": "CVE-2016-3426",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3426"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0650",
                    "reference_id": "RHSA-2016:0650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0650"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0651",
                    "reference_id": "RHSA-2016:0651",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0651"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677",
                    "reference_id": "RHSA-2016:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701",
                    "reference_id": "RHSA-2016:0701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702",
                    "reference_id": "RHSA-2016:0702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708",
                    "reference_id": "RHSA-2016:0708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716",
                    "reference_id": "RHSA-2016:0716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0716"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039",
                    "reference_id": "RHSA-2016:1039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1039"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2963-1/",
                    "reference_id": "USN-2963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2963-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-3426"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-taqg-ukr5-ybbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37032?format=api",
            "vulnerability_id": "VCID-tc8v-xrjj-hucq",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78228",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78285",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78307",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78236",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7825",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78268",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:M/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554",
                    "reference_id": "1413554",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95533",
                    "reference_id": "95533",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95533"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3272"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8v-xrjj-hucq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34963?format=api",
            "vulnerability_id": "VCID-u1c5-pgk4-8bcj",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10346.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10346.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68842",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68776",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68794",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68814",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68793",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68862",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68885",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68871",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101315"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501873",
                    "reference_id": "1501873",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501873"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10346",
                    "reference_id": "CVE-2017-10346",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10346"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:38:59Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10346"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u1c5-pgk4-8bcj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38589?format=api",
            "vulnerability_id": "VCID-u3rj-qyrr-vkbw",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83752",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83686",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83699",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83716",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8374",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83746",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83763",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83756",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037040",
                    "reference_id": "1037040",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037040"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385723",
                    "reference_id": "1385723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385723"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93643",
                    "reference_id": "93643",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/93643"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3707",
                    "reference_id": "dsa-3707",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3707"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-04",
                    "reference_id": "GLSA-201611-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201611-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/",
                    "reference_id": "ntap-20161019-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20161019-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2079",
                    "reference_id": "RHSA-2016:2079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2079"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html",
                    "reference_id": "RHSA-2016-2079.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2088",
                    "reference_id": "RHSA-2016:2088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2088"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html",
                    "reference_id": "RHSA-2016-2088.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2089",
                    "reference_id": "RHSA-2016:2089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2089"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html",
                    "reference_id": "RHSA-2016-2089.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2090",
                    "reference_id": "RHSA-2016:2090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2090"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html",
                    "reference_id": "RHSA-2016-2090.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2136",
                    "reference_id": "RHSA-2016:2136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2136"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html",
                    "reference_id": "RHSA-2016-2136.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2137",
                    "reference_id": "RHSA-2016:2137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2137"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html",
                    "reference_id": "RHSA-2016-2137.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2138",
                    "reference_id": "RHSA-2016:2138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2138"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html",
                    "reference_id": "RHSA-2016-2138.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2658",
                    "reference_id": "RHSA-2016:2658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2658"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html",
                    "reference_id": "RHSA-2016-2658.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2659",
                    "reference_id": "RHSA-2016:2659",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2659"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html",
                    "reference_id": "RHSA-2016-2659.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0061",
                    "reference_id": "RHSA-2017:0061",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0061"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html",
                    "reference_id": "RHSA-2017-0061.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3121-1/",
                    "reference_id": "USN-3121-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3121-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3130-1/",
                    "reference_id": "USN-3130-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3130-1/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3130-1",
                    "reference_id": "USN-3130-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3130-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3154-1/",
                    "reference_id": "USN-3154-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3154-1/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3154-1",
                    "reference_id": "USN-3154-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3154-1"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-5542"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u3rj-qyrr-vkbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43639?format=api",
            "vulnerability_id": "VCID-uc2v-fweb-cfew",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2634.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2634.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32854",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32851",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32981",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33015",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32837",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32884",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32914",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32917",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32879",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102592",
                    "reference_id": "102592",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102592"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534943",
                    "reference_id": "1534943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534943"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2634"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uc2v-fweb-cfew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38581?format=api",
            "vulnerability_id": "VCID-upyj-tdcf-8kbe",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3606.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3606.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88327",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88271",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8828",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88295",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88299",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88319",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88324",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88335",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3641"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91912"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3077-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3077-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356963",
                    "reference_id": "1356963",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356963"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3606",
                    "reference_id": "CVE-2016-3606",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3606"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1776",
                    "reference_id": "RHSA-2016:1776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1776"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3077-1/",
                    "reference_id": "USN-3077-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3077-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-3606"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upyj-tdcf-8kbe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37025?format=api",
            "vulnerability_id": "VCID-v64t-4c46-3bhj",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8283",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82894",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82899",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82904",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82888",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82881",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82847",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8286",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583",
                    "reference_id": "1413583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95498",
                    "reference_id": "95498",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95498"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3253"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v64t-4c46-3bhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30935?format=api",
            "vulnerability_id": "VCID-v6ym-2522-fqgd",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0511.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0511.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0512.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0512.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0513.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0513.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0514.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0514.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0515.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0515.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0516.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0516.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0636.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0636.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94087",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94057",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94067",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9407",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94079",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94083",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94047",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160328-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160328-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3558"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/85376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/85376"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035401",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035401"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2942-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2942-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320650",
                    "reference_id": "1320650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320650"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0636",
                    "reference_id": "CVE-2016-0636",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0636"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-18",
                    "reference_id": "GLSA-201606-18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201606-18"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0511",
                    "reference_id": "RHSA-2016:0511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0512",
                    "reference_id": "RHSA-2016:0512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0512"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0513",
                    "reference_id": "RHSA-2016:0513",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0513"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0514",
                    "reference_id": "RHSA-2016:0514",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0514"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0515",
                    "reference_id": "RHSA-2016:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0516",
                    "reference_id": "RHSA-2016:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2942-1/",
                    "reference_id": "USN-2942-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2942-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0636"
            ],
            "risk_score": 4.2,
            "exploitability": "0.5",
            "weighted_severity": "8.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v6ym-2522-fqgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31611?format=api",
            "vulnerability_id": "VCID-vu44-899q-6kct",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10074.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10074.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83196",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83129",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83146",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83159",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83158",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83183",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8319",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83206",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.832",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471534",
                    "reference_id": "1471534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471534"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99731",
                    "reference_id": "99731",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99731"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10074"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vu44-899q-6kct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43634?format=api",
            "vulnerability_id": "VCID-w83z-5wt6-j3fz",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2603.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2603.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00095",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26426",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27761",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27874",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27833",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27876",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27928",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2787",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2797",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27828",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102625",
                    "reference_id": "102625",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102625"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534553",
                    "reference_id": "1534553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534553"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2603"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w83z-5wt6-j3fz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31321?format=api",
            "vulnerability_id": "VCID-wbup-e69y-3fgh",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56056",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56073",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55919",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56031",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56051",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5603",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56081",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56084",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56096",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/81123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/81123"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299073",
                    "reference_id": "1299073",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299073"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0448",
                    "reference_id": "CVE-2016-0448",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0448"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0448"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbup-e69y-3fgh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31609?format=api",
            "vulnerability_id": "VCID-wcc9-n2hm-87fx",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10067.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10067.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75121",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75078",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7508",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75109",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7512",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75132",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75155",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75133",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471535",
                    "reference_id": "1471535",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1471535"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99756",
                    "reference_id": "99756",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99756"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3919",
                    "reference_id": "dsa-3919",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3919"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3954",
                    "reference_id": "dsa-3954",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1789",
                    "reference_id": "RHSA-2017:1789",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1792",
                    "reference_id": "RHSA-2017:1792",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2424",
                    "reference_id": "RHSA-2017:2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2469",
                    "reference_id": "RHSA-2017:2469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2481",
                    "reference_id": "RHSA-2017:2481",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2481"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2530",
                    "reference_id": "RHSA-2017:2530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3366-1/",
                    "reference_id": "USN-3366-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3366-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3396-1/",
                    "reference_id": "USN-3396-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3396-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10067"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wcc9-n2hm-87fx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30940?format=api",
            "vulnerability_id": "VCID-wchf-kwep-7khm",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3425.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3425.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92629",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.09098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92635",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92641",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.09098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92642",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.09098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92653",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.09098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92657",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.09098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92663",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.09098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92662",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3425"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10159"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160420-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3558"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/86434",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/86434"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035596"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2963-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2964-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2964-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2972-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2972-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328040",
                    "reference_id": "1328040",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328040"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3425",
                    "reference_id": "CVE-2016-3425",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3425"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-18",
                    "reference_id": "GLSA-201606-18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201606-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0650",
                    "reference_id": "RHSA-2016:0650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0650"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0651",
                    "reference_id": "RHSA-2016:0651",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0651"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0675",
                    "reference_id": "RHSA-2016:0675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0676",
                    "reference_id": "RHSA-2016:0676",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0676"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677",
                    "reference_id": "RHSA-2016:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678",
                    "reference_id": "RHSA-2016:0678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0678"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679",
                    "reference_id": "RHSA-2016:0679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0723",
                    "reference_id": "RHSA-2016:0723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0723"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2963-1/",
                    "reference_id": "USN-2963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2963-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2964-1/",
                    "reference_id": "USN-2964-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2964-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2972-1/",
                    "reference_id": "USN-2972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-3425"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wchf-kwep-7khm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34960?format=api",
            "vulnerability_id": "VCID-wjun-m9my-5qbb",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10295.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10295.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57621",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57509",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57593",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57614",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57589",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57642",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57646",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57661",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57641",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101384",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101384"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502687",
                    "reference_id": "1502687",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502687"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10295",
                    "reference_id": "CVE-2017-10295",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10295"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:45:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10295"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wjun-m9my-5qbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31324?format=api",
            "vulnerability_id": "VCID-wqcq-rktw-jyct",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93956",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93955",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93919",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93928",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93938",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9394",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93949",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93952",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-032"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299441",
                    "reference_id": "1299441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299441"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0483",
                    "reference_id": "CVE-2016-0483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0483"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqcq-rktw-jyct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43640?format=api",
            "vulnerability_id": "VCID-xqrm-1bu9-abfe",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2637.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2637.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41117",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41052",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41134",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41164",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41091",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41139",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41147",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41167",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102576",
                    "reference_id": "102576",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102576"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534970",
                    "reference_id": "1534970",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534970"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2637"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqrm-1bu9-abfe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34969?format=api",
            "vulnerability_id": "VCID-xx3g-udjr-7yep",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10355.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10355.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90952",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90901",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90907",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90916",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90927",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90938",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90944",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90953",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20171019-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4015"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4048"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101369"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502869",
                    "reference_id": "1502869",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502869"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://blogs.securiteam.com/index.php/archives/3271",
                    "reference_id": "CVE-2017-10355",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://blogs.securiteam.com/index.php/archives/3271"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/44057.md",
                    "reference_id": "CVE-2017-10355",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/dos/44057.md"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10355",
                    "reference_id": "CVE-2017-10355",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10355"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-31",
                    "reference_id": "GLSA-201710-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201710-31"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201711-14",
                    "reference_id": "GLSA-201711-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201711-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2998",
                    "reference_id": "RHSA-2017:2998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999",
                    "reference_id": "RHSA-2017:2999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046",
                    "reference_id": "RHSA-2017:3046",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3046"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047",
                    "reference_id": "RHSA-2017:3047",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3047"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3264",
                    "reference_id": "RHSA-2017:3264",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3267",
                    "reference_id": "RHSA-2017:3267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3268",
                    "reference_id": "RHSA-2017:3268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3392",
                    "reference_id": "RHSA-2017:3392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:35:22Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3473-1/",
                    "reference_id": "USN-3473-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3473-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3497-1/",
                    "reference_id": "USN-3497-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3497-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-10355"
            ],
            "risk_score": 9.6,
            "exploitability": "2.0",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xx3g-udjr-7yep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43635?format=api",
            "vulnerability_id": "VCID-y34y-ewv6-fkhb",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2618.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2618.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33108",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32987",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33012",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33051",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33047",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33017",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32971",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33141",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32979",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102612",
                    "reference_id": "102612",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102612"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534762",
                    "reference_id": "1534762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534762"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbst03911en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4144",
                    "reference_id": "dsa-4144",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4144"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4166",
                    "reference_id": "dsa-4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4166"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0095",
                    "reference_id": "RHSA-2018:0095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0095"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0115",
                    "reference_id": "RHSA-2018:0115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0115"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0349",
                    "reference_id": "RHSA-2018:0349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0351",
                    "reference_id": "RHSA-2018:0351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0352",
                    "reference_id": "RHSA-2018:0352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0458",
                    "reference_id": "RHSA-2018:0458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0521",
                    "reference_id": "RHSA-2018:0521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3613-1/",
                    "reference_id": "USN-3613-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3614-1/",
                    "reference_id": "USN-3614-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3614-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2618"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y34y-ewv6-fkhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43652?format=api",
            "vulnerability_id": "VCID-z4et-kgqx-qkgy",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2799.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2799.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31522",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31385",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31564",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31382",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31435",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31469",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31426",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3139",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/b53d4601ecd9ec63c799dbe1bc5b78e0d52f4cef429da2dfe63cf06d%40%3Cfop-dev.xmlgraphics.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/b53d4601ecd9ec63c799dbe1bc5b78e0d52f4cef429da2dfe63cf06d%40%3Cfop-dev.xmlgraphics.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r449b5d89c7b2ba3762584cf6c38e01867d4b24706e023cf2a9911307%40%3Cuser.spark.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r449b5d89c7b2ba3762584cf6c38e01867d4b24706e023cf2a9911307%40%3Cuser.spark.apache.org%3E"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180419-0001/"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4185"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4225"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/103872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/103872"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567542",
                    "reference_id": "1567542",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567542"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces-j:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:xerces-j:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces-j:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update171:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update162:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2799",
                    "reference_id": "CVE-2018-2799",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2799"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-14",
                    "reference_id": "GLSA-201903-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1188",
                    "reference_id": "RHSA-2018:1188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1191",
                    "reference_id": "RHSA-2018:1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1201",
                    "reference_id": "RHSA-2018:1201",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1201"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1202",
                    "reference_id": "RHSA-2018:1202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1202"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1204",
                    "reference_id": "RHSA-2018:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1206",
                    "reference_id": "RHSA-2018:1206",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1270",
                    "reference_id": "RHSA-2018:1270",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1270"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1278",
                    "reference_id": "RHSA-2018:1278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1278"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1721",
                    "reference_id": "RHSA-2018:1721",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1722",
                    "reference_id": "RHSA-2018:1722",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1723",
                    "reference_id": "RHSA-2018:1723",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1724",
                    "reference_id": "RHSA-2018:1724",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1724"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1974",
                    "reference_id": "RHSA-2018:1974",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1974"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1975",
                    "reference_id": "RHSA-2018:1975",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1975"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3644-1/",
                    "reference_id": "USN-3644-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3644-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3691-1/",
                    "reference_id": "USN-3691-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:13:15Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3691-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2018-2799"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z4et-kgqx-qkgy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38585?format=api",
            "vulnerability_id": "VCID-zbhh-berx-q3gh",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3610.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3610.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88785",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88729",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88738",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88755",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88757",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88774",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88778",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8879",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91930",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91930"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356994",
                    "reference_id": "1356994",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356994"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3610",
                    "reference_id": "CVE-2016-3610",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3610"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-3610"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zbhh-berx-q3gh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60250?format=api",
            "vulnerability_id": "VCID-zzqd-253d-ykca",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3509.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3509.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72418",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72389",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72402",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72343",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72367",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72344",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72383",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72395",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72348",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3858"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/97737"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443052",
                    "reference_id": "1443052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443052"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6:update_141:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7:update_131:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8:update_121:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3509",
                    "reference_id": "CVE-2017-3509",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3509"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201705-03",
                    "reference_id": "GLSA-201705-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201705-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1108",
                    "reference_id": "RHSA-2017:1108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1109",
                    "reference_id": "RHSA-2017:1109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1117",
                    "reference_id": "RHSA-2017:1117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1117"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1118",
                    "reference_id": "RHSA-2017:1118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1118"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1119",
                    "reference_id": "RHSA-2017:1119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1204",
                    "reference_id": "RHSA-2017:1204",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220",
                    "reference_id": "RHSA-2017:1220",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221",
                    "reference_id": "RHSA-2017:1221",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1221"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222",
                    "reference_id": "RHSA-2017:1222",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453",
                    "reference_id": "RHSA-2017:3453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:13Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3453"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-1/",
                    "reference_id": "USN-3275-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3275-2/",
                    "reference_id": "USN-3275-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3275-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2017-3509"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zzqd-253d-ykca"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31303?format=api",
            "vulnerability_id": "VCID-1m2k-jt6j-kyam",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4842.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4842.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86771",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86709",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86719",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86737",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86756",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86765",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86778",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86776",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77154",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77154"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273425",
                    "reference_id": "1273425",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273425"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4842",
                    "reference_id": "CVE-2015-4842",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4842"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4842"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1m2k-jt6j-kyam"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31319?format=api",
            "vulnerability_id": "VCID-4p3u-gdhr-jucj",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87168",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87172",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87113",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87123",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8714",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87137",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87157",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87178",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/81096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/81096"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298957",
                    "reference_id": "1298957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298957"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0402",
                    "reference_id": "CVE-2016-0402",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0402"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0402"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4p3u-gdhr-jucj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31300?format=api",
            "vulnerability_id": "VCID-5u17-kgsw-akar",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4806.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4806.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86059",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86086",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86085",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86105",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86115",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86129",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86128",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86124",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233687",
                    "reference_id": "1233687",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233687"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2518",
                    "reference_id": "RHSA-2015:2518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4806"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5u17-kgsw-akar"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31299?format=api",
            "vulnerability_id": "VCID-6y1r-9shn-abdp",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4805.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4805.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91073",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91079",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91087",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91096",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91109",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91114",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91122",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91123",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273311",
                    "reference_id": "1273311",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273311"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2518",
                    "reference_id": "RHSA-2015:2518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4805"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6y1r-9shn-abdp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31292?format=api",
            "vulnerability_id": "VCID-7y2q-c6xs-nbex",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4734.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4734.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86709",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86719",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86737",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86756",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86765",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86778",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86776",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86771",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273430",
                    "reference_id": "1273430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273430"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4734"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7y2q-c6xs-nbex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31312?format=api",
            "vulnerability_id": "VCID-a326-kbt5-h7bp",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4882.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4882.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91156",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91107",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91112",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91121",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91128",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91141",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91147",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91154",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77181"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273414",
                    "reference_id": "1273414",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273414"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4882",
                    "reference_id": "CVE-2015-4882",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4882"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4882"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a326-kbt5-h7bp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31301?format=api",
            "vulnerability_id": "VCID-au4s-5j9w-nybx",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4835.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4835.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89575",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89533",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89547",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89548",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89565",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89569",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89577",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77148",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77148"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273022",
                    "reference_id": "1273022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273022"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4835",
                    "reference_id": "CVE-2015-4835",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4835"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4835"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-au4s-5j9w-nybx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31313?format=api",
            "vulnerability_id": "VCID-b9wa-u375-xuef",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4883.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4883.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92193",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92161",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92168",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92174",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92177",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92188",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92192",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92197",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77161",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77161"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273304",
                    "reference_id": "1273304",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273304"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4883",
                    "reference_id": "CVE-2015-4883",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4883"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2518",
                    "reference_id": "RHSA-2015:2518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4883"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b9wa-u375-xuef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31311?format=api",
            "vulnerability_id": "VCID-ds2p-83xe-dfdm",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4881.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4881.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91766",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91724",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91732",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91738",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91745",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91757",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91765",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91768",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9177",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77159"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273027",
                    "reference_id": "1273027",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273027"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4881",
                    "reference_id": "CVE-2015-4881",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4881"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4881"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2p-83xe-dfdm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31310?format=api",
            "vulnerability_id": "VCID-e4dr-2bah-k7bp",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4872.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4872.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87705",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87651",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87661",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87674",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87675",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87696",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87702",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87714",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0356",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87707",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10141"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77211",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77211"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273734",
                    "reference_id": "1273734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273734"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4872",
                    "reference_id": "CVE-2015-4872",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4872"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2518",
                    "reference_id": "RHSA-2015:2518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4872"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e4dr-2bah-k7bp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31325?format=api",
            "vulnerability_id": "VCID-gted-bme5-r7gf",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92461",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92463",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9242",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92426",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92435",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92437",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92454",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9246",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0494"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298906",
                    "reference_id": "1298906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298906"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0494",
                    "reference_id": "CVE-2016-0494",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0494"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3227-1/",
                    "reference_id": "USN-3227-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3227-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0494"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gted-bme5-r7gf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31309?format=api",
            "vulnerability_id": "VCID-j35a-btuq-83hs",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4871.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4871.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4871",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85048",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84972",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84986",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85004",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85008",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8503",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85037",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85054",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85052",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4871"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3401",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3401"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77238"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2818-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2818-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273859",
                    "reference_id": "1273859",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273859"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4871",
                    "reference_id": "CVE-2015-4871",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4871"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2818-1/",
                    "reference_id": "USN-2818-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2818-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4871"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j35a-btuq-83hs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31322?format=api",
            "vulnerability_id": "VCID-jj9j-kwv8-byba",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89689",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89696",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89648",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89651",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89665",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89668",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89684",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8969",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89698",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/81118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/81118"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299385",
                    "reference_id": "1299385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299385"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0466",
                    "reference_id": "CVE-2016-0466",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0466"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0466"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jj9j-kwv8-byba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31315?format=api",
            "vulnerability_id": "VCID-kahp-6ybn-9yax",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4893.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4893.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91156",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91107",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91112",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91121",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91128",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91141",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91147",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91154",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10141"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77207"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273638",
                    "reference_id": "1273638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273638"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4893",
                    "reference_id": "CVE-2015-4893",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4893"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4893"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kahp-6ybn-9yax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31316?format=api",
            "vulnerability_id": "VCID-knv6-1uv9-yfcy",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4903.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4903.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86771",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86709",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86719",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86737",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86756",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86765",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86778",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86776",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77194"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273496",
                    "reference_id": "1273496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273496"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4903",
                    "reference_id": "CVE-2015-4903",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4903"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2518",
                    "reference_id": "RHSA-2015:2518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4903"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-knv6-1uv9-yfcy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31307?format=api",
            "vulnerability_id": "VCID-nv52-jzcr-37ay",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4860.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4860.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92193",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92161",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92168",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92174",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92177",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92188",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92192",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92197",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77162",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77162"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273308",
                    "reference_id": "1273308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273308"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4860",
                    "reference_id": "CVE-2015-4860",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4860"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2518",
                    "reference_id": "RHSA-2015:2518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4860"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nv52-jzcr-37ay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31305?format=api",
            "vulnerability_id": "VCID-qb56-zfz8-4bev",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4844.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4844.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93202",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93173",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93183",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93187",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93185",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93194",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93198",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93203",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.10364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.932",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77164"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273318",
                    "reference_id": "1273318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273318"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4844",
                    "reference_id": "CVE-2015-4844",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4844"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2518",
                    "reference_id": "RHSA-2015:2518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3227-1/",
                    "reference_id": "USN-3227-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3227-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4844"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qb56-zfz8-4bev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39980?format=api",
            "vulnerability_id": "VCID-qup9-qy11-fqhe",
            "summary": "Multiple vulnerabilities have been found in mbed TLS, the worst of\n    which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81189",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81125",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81184",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8119",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8121",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81196",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81134",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81157",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7575"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1158489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1158489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950"
                },
                {
                    "reference_url": "https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160225-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20160225-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3436",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3436"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3437"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3457"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3491"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3688",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3688"
                },
                {
                    "reference_url": "http://www.mozilla.org/security/announce/2015/mfsa2015-150.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mozilla.org/security/announce/2015/mfsa2015-150.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79684",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79684"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034541"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1036467"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2863-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2863-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2864-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2864-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2865-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2865-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2866-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2866-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2904-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2904-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289841",
                    "reference_id": "1289841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289841"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7575",
                    "reference_id": "CVE-2015-7575",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7575"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-46",
                    "reference_id": "GLSA-201701-46",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-46"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-18",
                    "reference_id": "GLSA-201706-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-18"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201801-15",
                    "reference_id": "GLSA-201801-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201801-15"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-150",
                    "reference_id": "mfsa2015-150",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-150"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0007",
                    "reference_id": "RHSA-2016:0007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0008",
                    "reference_id": "RHSA-2016:0008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0008"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0012",
                    "reference_id": "RHSA-2016:0012",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0012"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2863-1/",
                    "reference_id": "USN-2863-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2863-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2864-1/",
                    "reference_id": "USN-2864-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2864-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2865-1/",
                    "reference_id": "USN-2865-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2865-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2866-1/",
                    "reference_id": "USN-2866-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2866-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2904-1/",
                    "reference_id": "USN-2904-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2904-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2015-7575"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qup9-qy11-fqhe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31302?format=api",
            "vulnerability_id": "VCID-r691-77bt-skhe",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4840.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4840.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86771",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86709",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86719",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86739",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86737",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86756",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86765",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86778",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86776",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77242",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77242"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273338",
                    "reference_id": "1273338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273338"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4840",
                    "reference_id": "CVE-2015-4840",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4840"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4840"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r691-77bt-skhe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31317?format=api",
            "vulnerability_id": "VCID-t1yx-brps-4yhe",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4911.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4911.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91156",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91107",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91112",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91121",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91128",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91141",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91147",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91154",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10141"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77209"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273645",
                    "reference_id": "1273645",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273645"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4911",
                    "reference_id": "CVE-2015-4911",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4911"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4911"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t1yx-brps-4yhe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31298?format=api",
            "vulnerability_id": "VCID-u5jr-jf83-gbbb",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4803.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4803.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91107",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91112",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91121",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91128",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91141",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91147",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91154",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06584",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91156",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273637",
                    "reference_id": "1273637",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273637"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4803"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u5jr-jf83-gbbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31304?format=api",
            "vulnerability_id": "VCID-vf65-ugfc-nueg",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1919.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1920.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1921.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1926.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1927.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1928.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2506.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2507.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2508.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2509.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2518.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4843.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4843.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.14057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94349",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.14057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9431",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.14057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94319",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.14057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94329",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.14057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9433",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.14057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94339",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.14057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94343",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.14057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94347",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3381"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77160",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77160"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033884"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2784-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2784-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2827-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2827-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273053",
                    "reference_id": "1273053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273053"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4843",
                    "reference_id": "CVE-2015-4843",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4843"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1919",
                    "reference_id": "RHSA-2015:1919",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1919"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1920",
                    "reference_id": "RHSA-2015:1920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1920"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1921",
                    "reference_id": "RHSA-2015:1921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1921"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1926",
                    "reference_id": "RHSA-2015:1926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1926"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1927",
                    "reference_id": "RHSA-2015:1927",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1927"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1928",
                    "reference_id": "RHSA-2015:1928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1928"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2086",
                    "reference_id": "RHSA-2015:2086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2506",
                    "reference_id": "RHSA-2015:2506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2507",
                    "reference_id": "RHSA-2015:2507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2508",
                    "reference_id": "RHSA-2015:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2509",
                    "reference_id": "RHSA-2015:2509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2518",
                    "reference_id": "RHSA-2015:2518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2784-1/",
                    "reference_id": "USN-2784-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2784-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2827-1/",
                    "reference_id": "USN-2827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                }
            ],
            "aliases": [
                "CVE-2015-4843"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vf65-ugfc-nueg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31321?format=api",
            "vulnerability_id": "VCID-wbup-e69y-3fgh",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56056",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56073",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55919",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56031",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56051",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5603",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56081",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56084",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56096",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/81123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/81123"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299073",
                    "reference_id": "1299073",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299073"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0448",
                    "reference_id": "CVE-2016-0448",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0448"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0448"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbup-e69y-3fgh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31324?format=api",
            "vulnerability_id": "VCID-wqcq-rktw-jyct",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93956",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93955",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93919",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93928",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93938",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9394",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93949",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93952",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-032"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299441",
                    "reference_id": "1299441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299441"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0483",
                    "reference_id": "CVE-2016-0483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571158?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1pew-7np4-vqfu"
                        },
                        {
                            "vulnerability": "VCID-1x1r-hjrb-6ydb"
                        },
                        {
                            "vulnerability": "VCID-1yfj-cdt7-1yhf"
                        },
                        {
                            "vulnerability": "VCID-27zg-g9hc-4bg1"
                        },
                        {
                            "vulnerability": "VCID-2jc9-6xf6-63a6"
                        },
                        {
                            "vulnerability": "VCID-2krr-m59b-77a7"
                        },
                        {
                            "vulnerability": "VCID-2r75-1ccm-d7aw"
                        },
                        {
                            "vulnerability": "VCID-3mqp-7bx4-jbhv"
                        },
                        {
                            "vulnerability": "VCID-3xyb-xeyq-n3dm"
                        },
                        {
                            "vulnerability": "VCID-49z5-4djw-xuav"
                        },
                        {
                            "vulnerability": "VCID-4p3u-gdhr-jucj"
                        },
                        {
                            "vulnerability": "VCID-4ucs-3zp9-rqey"
                        },
                        {
                            "vulnerability": "VCID-4zte-62md-kyd8"
                        },
                        {
                            "vulnerability": "VCID-5jvq-evzj-tfcc"
                        },
                        {
                            "vulnerability": "VCID-5vrc-h4t3-uucb"
                        },
                        {
                            "vulnerability": "VCID-6383-1rzy-9kcr"
                        },
                        {
                            "vulnerability": "VCID-69zc-r9uw-jke5"
                        },
                        {
                            "vulnerability": "VCID-6aph-ab51-2qbt"
                        },
                        {
                            "vulnerability": "VCID-6qtk-xzvb-ubfr"
                        },
                        {
                            "vulnerability": "VCID-6xzp-k5m9-ykbc"
                        },
                        {
                            "vulnerability": "VCID-7d2e-14yp-pkhq"
                        },
                        {
                            "vulnerability": "VCID-7ez7-vdry-wbep"
                        },
                        {
                            "vulnerability": "VCID-8edn-xjyj-9fgf"
                        },
                        {
                            "vulnerability": "VCID-8f22-4b8p-m3aa"
                        },
                        {
                            "vulnerability": "VCID-8t17-88c7-xqcz"
                        },
                        {
                            "vulnerability": "VCID-8vr7-v6d5-gfhw"
                        },
                        {
                            "vulnerability": "VCID-8y3w-1sev-27d4"
                        },
                        {
                            "vulnerability": "VCID-9bbp-mutu-bqbf"
                        },
                        {
                            "vulnerability": "VCID-9yds-dpzg-4ba9"
                        },
                        {
                            "vulnerability": "VCID-a6rq-d1rv-j7dn"
                        },
                        {
                            "vulnerability": "VCID-ar8p-z4ww-wuau"
                        },
                        {
                            "vulnerability": "VCID-awrz-da8u-7ud2"
                        },
                        {
                            "vulnerability": "VCID-b15r-cqd5-rugd"
                        },
                        {
                            "vulnerability": "VCID-b731-snhn-jugu"
                        },
                        {
                            "vulnerability": "VCID-bg39-wvte-83c1"
                        },
                        {
                            "vulnerability": "VCID-bthw-frhn-wqf6"
                        },
                        {
                            "vulnerability": "VCID-c7sa-v6cu-d3ex"
                        },
                        {
                            "vulnerability": "VCID-c9qw-1g2p-qqcr"
                        },
                        {
                            "vulnerability": "VCID-cp95-73tk-2qhc"
                        },
                        {
                            "vulnerability": "VCID-ctd4-2fps-3bfk"
                        },
                        {
                            "vulnerability": "VCID-d4gw-vgm6-qbf3"
                        },
                        {
                            "vulnerability": "VCID-db1c-8scn-buet"
                        },
                        {
                            "vulnerability": "VCID-dtcg-vqnh-kugk"
                        },
                        {
                            "vulnerability": "VCID-e2zb-3859-qfe6"
                        },
                        {
                            "vulnerability": "VCID-e8nm-ey3v-pfga"
                        },
                        {
                            "vulnerability": "VCID-ejfg-8n1t-53b9"
                        },
                        {
                            "vulnerability": "VCID-enkm-4xpy-6bfp"
                        },
                        {
                            "vulnerability": "VCID-fsu1-jy1q-qkh1"
                        },
                        {
                            "vulnerability": "VCID-ft81-49v3-a7cr"
                        },
                        {
                            "vulnerability": "VCID-ftnn-eurn-wydw"
                        },
                        {
                            "vulnerability": "VCID-gceb-nxww-w3f5"
                        },
                        {
                            "vulnerability": "VCID-gfk8-e7xe-17fk"
                        },
                        {
                            "vulnerability": "VCID-gted-bme5-r7gf"
                        },
                        {
                            "vulnerability": "VCID-htzk-vgn5-m7ak"
                        },
                        {
                            "vulnerability": "VCID-hvzr-km7c-cqgz"
                        },
                        {
                            "vulnerability": "VCID-hxb8-qu7h-8bdu"
                        },
                        {
                            "vulnerability": "VCID-j5hg-xy6j-rkgv"
                        },
                        {
                            "vulnerability": "VCID-jccp-8k75-xkhn"
                        },
                        {
                            "vulnerability": "VCID-jh9n-h2qn-pqh3"
                        },
                        {
                            "vulnerability": "VCID-jj9j-kwv8-byba"
                        },
                        {
                            "vulnerability": "VCID-k3pa-xdxn-ubbg"
                        },
                        {
                            "vulnerability": "VCID-k57c-bcn4-zbat"
                        },
                        {
                            "vulnerability": "VCID-kejc-5261-t7c6"
                        },
                        {
                            "vulnerability": "VCID-kw91-zqtv-7kap"
                        },
                        {
                            "vulnerability": "VCID-m84d-m2tw-tyet"
                        },
                        {
                            "vulnerability": "VCID-n1wv-bkbb-gugt"
                        },
                        {
                            "vulnerability": "VCID-n46g-eb9y-9bds"
                        },
                        {
                            "vulnerability": "VCID-nwvg-gjkx-8khw"
                        },
                        {
                            "vulnerability": "VCID-pdv6-xmdk-d3hy"
                        },
                        {
                            "vulnerability": "VCID-ps35-n8f5-uqcr"
                        },
                        {
                            "vulnerability": "VCID-qfam-11ye-tkd8"
                        },
                        {
                            "vulnerability": "VCID-qs1s-6yjm-jye5"
                        },
                        {
                            "vulnerability": "VCID-qup9-qy11-fqhe"
                        },
                        {
                            "vulnerability": "VCID-r1ff-e1sf-eqeg"
                        },
                        {
                            "vulnerability": "VCID-r4tw-jgd7-euet"
                        },
                        {
                            "vulnerability": "VCID-r7cu-ewk5-pygd"
                        },
                        {
                            "vulnerability": "VCID-rf14-48vb-w7gh"
                        },
                        {
                            "vulnerability": "VCID-rgf4-rwp5-dqd7"
                        },
                        {
                            "vulnerability": "VCID-rvvx-ed8u-auc5"
                        },
                        {
                            "vulnerability": "VCID-rxem-v2fe-jfde"
                        },
                        {
                            "vulnerability": "VCID-snqh-ebq3-hubn"
                        },
                        {
                            "vulnerability": "VCID-ssf2-jqkb-3qgw"
                        },
                        {
                            "vulnerability": "VCID-taqg-ukr5-ybbk"
                        },
                        {
                            "vulnerability": "VCID-tc8v-xrjj-hucq"
                        },
                        {
                            "vulnerability": "VCID-u1c5-pgk4-8bcj"
                        },
                        {
                            "vulnerability": "VCID-u3rj-qyrr-vkbw"
                        },
                        {
                            "vulnerability": "VCID-uc2v-fweb-cfew"
                        },
                        {
                            "vulnerability": "VCID-upyj-tdcf-8kbe"
                        },
                        {
                            "vulnerability": "VCID-v64t-4c46-3bhj"
                        },
                        {
                            "vulnerability": "VCID-v6ym-2522-fqgd"
                        },
                        {
                            "vulnerability": "VCID-vu44-899q-6kct"
                        },
                        {
                            "vulnerability": "VCID-w83z-5wt6-j3fz"
                        },
                        {
                            "vulnerability": "VCID-wbup-e69y-3fgh"
                        },
                        {
                            "vulnerability": "VCID-wcc9-n2hm-87fx"
                        },
                        {
                            "vulnerability": "VCID-wchf-kwep-7khm"
                        },
                        {
                            "vulnerability": "VCID-wjun-m9my-5qbb"
                        },
                        {
                            "vulnerability": "VCID-wqcq-rktw-jyct"
                        },
                        {
                            "vulnerability": "VCID-xqrm-1bu9-abfe"
                        },
                        {
                            "vulnerability": "VCID-xx3g-udjr-7yep"
                        },
                        {
                            "vulnerability": "VCID-y34y-ewv6-fkhb"
                        },
                        {
                            "vulnerability": "VCID-z4et-kgqx-qkgy"
                        },
                        {
                            "vulnerability": "VCID-zbhh-berx-q3gh"
                        },
                        {
                            "vulnerability": "VCID-zzqd-253d-ykca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035656?format=api",
                    "purl": "pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u181-2.6.14-1~deb8u1"
                }
            ],
            "aliases": [
                "CVE-2016-0483"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqcq-rktw-jyct"
        }
    ],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-7@7u95-2.6.4-1~deb7u1"
}