Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-java/icedtea-bin@7.2.6.11
Typeebuild
Namespacedev-java
Nameicedtea-bin
Version7.2.6.11
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.252_p09
Latest_non_vulnerable_version8.252_p09
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1x1r-hjrb-6ydb
vulnerability_id VCID-1x1r-hjrb-6ydb
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10081.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10081
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.527
published_at 2026-04-21T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52571
published_at 2026-04-01T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52614
published_at 2026-04-02T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.5264
published_at 2026-04-04T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52607
published_at 2026-04-07T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52658
published_at 2026-04-08T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52653
published_at 2026-04-09T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52703
published_at 2026-04-11T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52686
published_at 2026-04-12T12:55:00Z
9
value 0.00293
scoring_system epss
scoring_elements 0.52671
published_at 2026-04-13T12:55:00Z
10
value 0.00293
scoring_system epss
scoring_elements 0.52709
published_at 2026-04-16T12:55:00Z
11
value 0.00293
scoring_system epss
scoring_elements 0.52716
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471711
reference_id 1471711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471711
29
reference_url http://www.securityfocus.com/bid/99853
reference_id 99853
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.securityfocus.com/bid/99853
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
40
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10081
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1x1r-hjrb-6ydb
1
url VCID-3mqp-7bx4-jbhv
vulnerability_id VCID-3mqp-7bx4-jbhv
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10176.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10176
reference_id
reference_type
scores
0
value 0.02457
scoring_system epss
scoring_elements 0.85244
published_at 2026-04-18T12:55:00Z
1
value 0.02457
scoring_system epss
scoring_elements 0.85185
published_at 2026-04-07T12:55:00Z
2
value 0.02457
scoring_system epss
scoring_elements 0.85207
published_at 2026-04-08T12:55:00Z
3
value 0.02457
scoring_system epss
scoring_elements 0.85215
published_at 2026-04-09T12:55:00Z
4
value 0.02457
scoring_system epss
scoring_elements 0.85229
published_at 2026-04-11T12:55:00Z
5
value 0.02457
scoring_system epss
scoring_elements 0.85226
published_at 2026-04-12T12:55:00Z
6
value 0.02457
scoring_system epss
scoring_elements 0.85223
published_at 2026-04-13T12:55:00Z
7
value 0.02457
scoring_system epss
scoring_elements 0.85243
published_at 2026-04-21T12:55:00Z
8
value 0.02761
scoring_system epss
scoring_elements 0.85969
published_at 2026-04-02T12:55:00Z
9
value 0.02761
scoring_system epss
scoring_elements 0.85985
published_at 2026-04-04T12:55:00Z
10
value 0.02761
scoring_system epss
scoring_elements 0.85957
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472476
reference_id 1472476
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472476
29
reference_url http://www.securityfocus.com/bid/99788
reference_id 99788
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url http://www.securityfocus.com/bid/99788
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url https://access.redhat.com/errata/RHSA-2017:1791
36
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
37
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
38
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:31Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10176
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3mqp-7bx4-jbhv
2
url VCID-3xyb-xeyq-n3dm
vulnerability_id VCID-3xyb-xeyq-n3dm
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10090.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10090.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10090
reference_id
reference_type
scores
0
value 0.00489
scoring_system epss
scoring_elements 0.6559
published_at 2026-04-11T12:55:00Z
1
value 0.00489
scoring_system epss
scoring_elements 0.65514
published_at 2026-04-02T12:55:00Z
2
value 0.00489
scoring_system epss
scoring_elements 0.65582
published_at 2026-04-21T12:55:00Z
3
value 0.00489
scoring_system epss
scoring_elements 0.65598
published_at 2026-04-18T12:55:00Z
4
value 0.00489
scoring_system epss
scoring_elements 0.65508
published_at 2026-04-07T12:55:00Z
5
value 0.00489
scoring_system epss
scoring_elements 0.6556
published_at 2026-04-08T12:55:00Z
6
value 0.00489
scoring_system epss
scoring_elements 0.65571
published_at 2026-04-09T12:55:00Z
7
value 0.00489
scoring_system epss
scoring_elements 0.65585
published_at 2026-04-16T12:55:00Z
8
value 0.00489
scoring_system epss
scoring_elements 0.65466
published_at 2026-04-01T12:55:00Z
9
value 0.00489
scoring_system epss
scoring_elements 0.65549
published_at 2026-04-13T12:55:00Z
10
value 0.00489
scoring_system epss
scoring_elements 0.65577
published_at 2026-04-12T12:55:00Z
11
value 0.00489
scoring_system epss
scoring_elements 0.65542
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10090
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471517
reference_id 1471517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471517
29
reference_url http://www.securityfocus.com/bid/99706
reference_id 99706
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.securityfocus.com/bid/99706
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:2424
38
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:2469
39
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:2481
40
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:3453
41
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
42
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10090
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3xyb-xeyq-n3dm
3
url VCID-43vy-2etx-9ucx
vulnerability_id VCID-43vy-2etx-9ucx
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10078.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10078.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10078
reference_id
reference_type
scores
0
value 0.01518
scoring_system epss
scoring_elements 0.81275
published_at 2026-04-18T12:55:00Z
1
value 0.01518
scoring_system epss
scoring_elements 0.81173
published_at 2026-04-01T12:55:00Z
2
value 0.01518
scoring_system epss
scoring_elements 0.81182
published_at 2026-04-02T12:55:00Z
3
value 0.01518
scoring_system epss
scoring_elements 0.81205
published_at 2026-04-07T12:55:00Z
4
value 0.01518
scoring_system epss
scoring_elements 0.81233
published_at 2026-04-08T12:55:00Z
5
value 0.01518
scoring_system epss
scoring_elements 0.81238
published_at 2026-04-09T12:55:00Z
6
value 0.01518
scoring_system epss
scoring_elements 0.81258
published_at 2026-04-11T12:55:00Z
7
value 0.01518
scoring_system epss
scoring_elements 0.81244
published_at 2026-04-12T12:55:00Z
8
value 0.01518
scoring_system epss
scoring_elements 0.81237
published_at 2026-04-13T12:55:00Z
9
value 0.01518
scoring_system epss
scoring_elements 0.81274
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10078
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:N
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:49Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471898
reference_id 1471898
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471898
29
reference_url http://www.securityfocus.com/bid/99752
reference_id 99752
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:49Z/
url http://www.securityfocus.com/bid/99752
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:49Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:49Z/
url https://security.gentoo.org/glsa/201709-22
32
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:49Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
33
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:49Z/
url https://access.redhat.com/errata/RHSA-2017:1789
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:49Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:49Z/
url https://access.redhat.com/errata/RHSA-2017:2469
36
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:49Z/
url https://access.redhat.com/errata/RHSA-2017:3453
37
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
38
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:49Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10078
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-43vy-2etx-9ucx
4
url VCID-49z5-4djw-xuav
vulnerability_id VCID-49z5-4djw-xuav
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10101.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10101.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10101
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64539
published_at 2026-04-21T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64546
published_at 2026-04-18T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
10
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
11
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10101
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471527
reference_id 1471527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471527
29
reference_url http://www.securityfocus.com/bid/99674
reference_id 99674
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.securityfocus.com/bid/99674
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10101
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49z5-4djw-xuav
5
url VCID-4m47-kkyx-dyet
vulnerability_id VCID-4m47-kkyx-dyet
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10086.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10086
reference_id
reference_type
scores
0
value 0.01124
scoring_system epss
scoring_elements 0.78296
published_at 2026-04-21T12:55:00Z
1
value 0.01124
scoring_system epss
scoring_elements 0.78215
published_at 2026-04-01T12:55:00Z
2
value 0.01124
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-02T12:55:00Z
3
value 0.01124
scoring_system epss
scoring_elements 0.78236
published_at 2026-04-07T12:55:00Z
4
value 0.01124
scoring_system epss
scoring_elements 0.78263
published_at 2026-04-08T12:55:00Z
5
value 0.01124
scoring_system epss
scoring_elements 0.78268
published_at 2026-04-09T12:55:00Z
6
value 0.01124
scoring_system epss
scoring_elements 0.78294
published_at 2026-04-11T12:55:00Z
7
value 0.01124
scoring_system epss
scoring_elements 0.78277
published_at 2026-04-12T12:55:00Z
8
value 0.01124
scoring_system epss
scoring_elements 0.78272
published_at 2026-04-13T12:55:00Z
9
value 0.01124
scoring_system epss
scoring_elements 0.78303
published_at 2026-04-16T12:55:00Z
10
value 0.01124
scoring_system epss
scoring_elements 0.783
published_at 2026-04-18T12:55:00Z
11
value 0.01124
scoring_system epss
scoring_elements 0.78254
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10086
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url http://www.securitytracker.com/id/1038931
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472657
reference_id 1472657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472657
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860
reference_id 870860
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860
8
reference_url http://www.securityfocus.com/bid/99662
reference_id 99662
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url http://www.securityfocus.com/bid/99662
9
reference_url http://www.debian.org/security/2017/dsa-4005
reference_id dsa-4005
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url http://www.debian.org/security/2017/dsa-4005
10
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url https://security.gentoo.org/glsa/201709-22
11
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
12
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url https://access.redhat.com/errata/RHSA-2017:1790
13
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url https://access.redhat.com/errata/RHSA-2017:1791
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10086
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4m47-kkyx-dyet
6
url VCID-4ucs-3zp9-rqey
vulnerability_id VCID-4ucs-3zp9-rqey
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10053.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10053
reference_id
reference_type
scores
0
value 0.0128
scoring_system epss
scoring_elements 0.79553
published_at 2026-04-04T12:55:00Z
1
value 0.0128
scoring_system epss
scoring_elements 0.79605
published_at 2026-04-21T12:55:00Z
2
value 0.0128
scoring_system epss
scoring_elements 0.79601
published_at 2026-04-18T12:55:00Z
3
value 0.0128
scoring_system epss
scoring_elements 0.79602
published_at 2026-04-16T12:55:00Z
4
value 0.0128
scoring_system epss
scoring_elements 0.79573
published_at 2026-04-13T12:55:00Z
5
value 0.0128
scoring_system epss
scoring_elements 0.79581
published_at 2026-04-12T12:55:00Z
6
value 0.0128
scoring_system epss
scoring_elements 0.79531
published_at 2026-04-02T12:55:00Z
7
value 0.0128
scoring_system epss
scoring_elements 0.79597
published_at 2026-04-11T12:55:00Z
8
value 0.0128
scoring_system epss
scoring_elements 0.79575
published_at 2026-04-09T12:55:00Z
9
value 0.0128
scoring_system epss
scoring_elements 0.79524
published_at 2026-04-01T12:55:00Z
10
value 0.0128
scoring_system epss
scoring_elements 0.79568
published_at 2026-04-08T12:55:00Z
11
value 0.0128
scoring_system epss
scoring_elements 0.79539
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10053
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471889
reference_id 1471889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471889
29
reference_url http://www.securityfocus.com/bid/99842
reference_id 99842
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.securityfocus.com/bid/99842
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10053
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ucs-3zp9-rqey
7
url VCID-5jvq-evzj-tfcc
vulnerability_id VCID-5jvq-evzj-tfcc
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10089.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10089.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10089
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64539
published_at 2026-04-21T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
10
value 0.00468
scoring_system epss
scoring_elements 0.64546
published_at 2026-04-18T12:55:00Z
11
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10089
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471270
reference_id 1471270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471270
29
reference_url http://www.securityfocus.com/bid/99659
reference_id 99659
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.securityfocus.com/bid/99659
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10089
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jvq-evzj-tfcc
8
url VCID-5vrc-h4t3-uucb
vulnerability_id VCID-5vrc-h4t3-uucb
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10243.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10243
reference_id
reference_type
scores
0
value 0.00949
scoring_system epss
scoring_elements 0.76398
published_at 2026-04-16T12:55:00Z
1
value 0.00949
scoring_system epss
scoring_elements 0.76312
published_at 2026-04-07T12:55:00Z
2
value 0.00949
scoring_system epss
scoring_elements 0.76345
published_at 2026-04-08T12:55:00Z
3
value 0.00949
scoring_system epss
scoring_elements 0.76358
published_at 2026-04-13T12:55:00Z
4
value 0.00949
scoring_system epss
scoring_elements 0.76385
published_at 2026-04-11T12:55:00Z
5
value 0.00949
scoring_system epss
scoring_elements 0.76363
published_at 2026-04-12T12:55:00Z
6
value 0.00949
scoring_system epss
scoring_elements 0.76389
published_at 2026-04-21T12:55:00Z
7
value 0.00949
scoring_system epss
scoring_elements 0.76302
published_at 2026-04-02T12:55:00Z
8
value 0.00949
scoring_system epss
scoring_elements 0.76299
published_at 2026-04-01T12:55:00Z
9
value 0.00949
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-18T12:55:00Z
10
value 0.00949
scoring_system epss
scoring_elements 0.76332
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472666
reference_id 1472666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472666
29
reference_url http://www.securityfocus.com/bid/99827
reference_id 99827
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url http://www.securityfocus.com/bid/99827
30
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url http://www.debian.org/security/2017/dsa-3954
31
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://security.gentoo.org/glsa/201709-22
32
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
33
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1789
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1791
36
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1792
37
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2424
38
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2469
39
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2481
40
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2530
41
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:3453
42
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
43
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10243
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vrc-h4t3-uucb
9
url VCID-7d2e-14yp-pkhq
vulnerability_id VCID-7d2e-14yp-pkhq
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10116.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10116
reference_id
reference_type
scores
0
value 0.00937
scoring_system epss
scoring_elements 0.76125
published_at 2026-04-01T12:55:00Z
1
value 0.00937
scoring_system epss
scoring_elements 0.76162
published_at 2026-04-04T12:55:00Z
2
value 0.00937
scoring_system epss
scoring_elements 0.76129
published_at 2026-04-02T12:55:00Z
3
value 0.0165
scoring_system epss
scoring_elements 0.82045
published_at 2026-04-21T12:55:00Z
4
value 0.0165
scoring_system epss
scoring_elements 0.8197
published_at 2026-04-07T12:55:00Z
5
value 0.0165
scoring_system epss
scoring_elements 0.81997
published_at 2026-04-08T12:55:00Z
6
value 0.0165
scoring_system epss
scoring_elements 0.82005
published_at 2026-04-09T12:55:00Z
7
value 0.0165
scoring_system epss
scoring_elements 0.82024
published_at 2026-04-11T12:55:00Z
8
value 0.0165
scoring_system epss
scoring_elements 0.82013
published_at 2026-04-12T12:55:00Z
9
value 0.0165
scoring_system epss
scoring_elements 0.82007
published_at 2026-04-13T12:55:00Z
10
value 0.0165
scoring_system epss
scoring_elements 0.82043
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10116
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471738
reference_id 1471738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471738
29
reference_url http://www.securityfocus.com/bid/99734
reference_id 99734
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.securityfocus.com/bid/99734
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10116
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7d2e-14yp-pkhq
10
url VCID-8t17-88c7-xqcz
vulnerability_id VCID-8t17-88c7-xqcz
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10135.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10135
reference_id
reference_type
scores
0
value 0.00405
scoring_system epss
scoring_elements 0.61037
published_at 2026-04-21T12:55:00Z
1
value 0.00405
scoring_system epss
scoring_elements 0.60887
published_at 2026-04-01T12:55:00Z
2
value 0.00405
scoring_system epss
scoring_elements 0.60959
published_at 2026-04-02T12:55:00Z
3
value 0.00405
scoring_system epss
scoring_elements 0.60989
published_at 2026-04-04T12:55:00Z
4
value 0.00405
scoring_system epss
scoring_elements 0.60954
published_at 2026-04-07T12:55:00Z
5
value 0.00405
scoring_system epss
scoring_elements 0.61002
published_at 2026-04-08T12:55:00Z
6
value 0.00405
scoring_system epss
scoring_elements 0.61018
published_at 2026-04-09T12:55:00Z
7
value 0.00405
scoring_system epss
scoring_elements 0.61039
published_at 2026-04-11T12:55:00Z
8
value 0.00405
scoring_system epss
scoring_elements 0.61025
published_at 2026-04-12T12:55:00Z
9
value 0.00405
scoring_system epss
scoring_elements 0.61005
published_at 2026-04-13T12:55:00Z
10
value 0.00405
scoring_system epss
scoring_elements 0.61047
published_at 2026-04-16T12:55:00Z
11
value 0.00405
scoring_system epss
scoring_elements 0.61052
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10135
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471871
reference_id 1471871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471871
29
reference_url http://www.securityfocus.com/bid/99839
reference_id 99839
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.securityfocus.com/bid/99839
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
40
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
41
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10135
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8t17-88c7-xqcz
11
url VCID-9yds-dpzg-4ba9
vulnerability_id VCID-9yds-dpzg-4ba9
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10102.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10102.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10102
reference_id
reference_type
scores
0
value 0.00673
scoring_system epss
scoring_elements 0.71416
published_at 2026-04-21T12:55:00Z
1
value 0.00673
scoring_system epss
scoring_elements 0.7134
published_at 2026-04-07T12:55:00Z
2
value 0.00673
scoring_system epss
scoring_elements 0.71348
published_at 2026-04-02T12:55:00Z
3
value 0.00673
scoring_system epss
scoring_elements 0.71366
published_at 2026-04-04T12:55:00Z
4
value 0.00673
scoring_system epss
scoring_elements 0.7138
published_at 2026-04-08T12:55:00Z
5
value 0.00673
scoring_system epss
scoring_elements 0.71393
published_at 2026-04-09T12:55:00Z
6
value 0.00673
scoring_system epss
scoring_elements 0.71417
published_at 2026-04-11T12:55:00Z
7
value 0.00673
scoring_system epss
scoring_elements 0.71401
published_at 2026-04-12T12:55:00Z
8
value 0.00673
scoring_system epss
scoring_elements 0.71384
published_at 2026-04-13T12:55:00Z
9
value 0.00673
scoring_system epss
scoring_elements 0.7143
published_at 2026-04-16T12:55:00Z
10
value 0.00673
scoring_system epss
scoring_elements 0.71436
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10102
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472345
reference_id 1472345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472345
29
reference_url http://www.securityfocus.com/bid/99712
reference_id 99712
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.securityfocus.com/bid/99712
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10102
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9yds-dpzg-4ba9
12
url VCID-awrz-da8u-7ud2
vulnerability_id VCID-awrz-da8u-7ud2
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10096.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10096
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64539
published_at 2026-04-21T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
10
value 0.00468
scoring_system epss
scoring_elements 0.64546
published_at 2026-04-18T12:55:00Z
11
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471528
reference_id 1471528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471528
29
reference_url http://www.securityfocus.com/bid/99670
reference_id 99670
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.securityfocus.com/bid/99670
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10096
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awrz-da8u-7ud2
13
url VCID-b731-snhn-jugu
vulnerability_id VCID-b731-snhn-jugu
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10198.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10198
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.56346
published_at 2026-04-21T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56206
published_at 2026-04-01T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56316
published_at 2026-04-02T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.56338
published_at 2026-04-04T12:55:00Z
4
value 0.00335
scoring_system epss
scoring_elements 0.56319
published_at 2026-04-07T12:55:00Z
5
value 0.00335
scoring_system epss
scoring_elements 0.5637
published_at 2026-04-08T12:55:00Z
6
value 0.00335
scoring_system epss
scoring_elements 0.56375
published_at 2026-04-09T12:55:00Z
7
value 0.00335
scoring_system epss
scoring_elements 0.56385
published_at 2026-04-11T12:55:00Z
8
value 0.00335
scoring_system epss
scoring_elements 0.56361
published_at 2026-04-12T12:55:00Z
9
value 0.00335
scoring_system epss
scoring_elements 0.56344
published_at 2026-04-13T12:55:00Z
10
value 0.00335
scoring_system epss
scoring_elements 0.56376
published_at 2026-04-16T12:55:00Z
11
value 0.00335
scoring_system epss
scoring_elements 0.56377
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:N/A:N
1
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472320
reference_id 1472320
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472320
29
reference_url http://www.securityfocus.com/bid/99818
reference_id 99818
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url http://www.securityfocus.com/bid/99818
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://access.redhat.com/errata/RHSA-2017:3392
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
40
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:37Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10198
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b731-snhn-jugu
14
url VCID-bthw-frhn-wqf6
vulnerability_id VCID-bthw-frhn-wqf6
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10109.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10109.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10109
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.72052
published_at 2026-04-16T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.72044
published_at 2026-04-21T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.71967
published_at 2026-04-07T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.72006
published_at 2026-04-08T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.72018
published_at 2026-04-09T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.72042
published_at 2026-04-11T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72026
published_at 2026-04-12T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72011
published_at 2026-04-13T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.71972
published_at 2026-04-02T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.71964
published_at 2026-04-01T12:55:00Z
10
value 0.007
scoring_system epss
scoring_elements 0.72059
published_at 2026-04-18T12:55:00Z
11
value 0.007
scoring_system epss
scoring_elements 0.71991
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10109
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471670
reference_id 1471670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471670
29
reference_url http://www.securityfocus.com/bid/99847
reference_id 99847
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.securityfocus.com/bid/99847
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10109
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bthw-frhn-wqf6
15
url VCID-ctd4-2fps-3bfk
vulnerability_id VCID-ctd4-2fps-3bfk
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10118.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10118.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10118
reference_id
reference_type
scores
0
value 0.00753
scoring_system epss
scoring_elements 0.73252
published_at 2026-04-21T12:55:00Z
1
value 0.00753
scoring_system epss
scoring_elements 0.73152
published_at 2026-04-01T12:55:00Z
2
value 0.00753
scoring_system epss
scoring_elements 0.73162
published_at 2026-04-02T12:55:00Z
3
value 0.00753
scoring_system epss
scoring_elements 0.73183
published_at 2026-04-04T12:55:00Z
4
value 0.00753
scoring_system epss
scoring_elements 0.73157
published_at 2026-04-07T12:55:00Z
5
value 0.00753
scoring_system epss
scoring_elements 0.73193
published_at 2026-04-08T12:55:00Z
6
value 0.00753
scoring_system epss
scoring_elements 0.73207
published_at 2026-04-13T12:55:00Z
7
value 0.00753
scoring_system epss
scoring_elements 0.73232
published_at 2026-04-11T12:55:00Z
8
value 0.00753
scoring_system epss
scoring_elements 0.73213
published_at 2026-04-12T12:55:00Z
9
value 0.00753
scoring_system epss
scoring_elements 0.73249
published_at 2026-04-16T12:55:00Z
10
value 0.00753
scoring_system epss
scoring_elements 0.73259
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10118
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472470
reference_id 1472470
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472470
29
reference_url http://www.securityfocus.com/bid/99782
reference_id 99782
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url http://www.securityfocus.com/bid/99782
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url https://access.redhat.com/errata/RHSA-2017:1791
36
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
37
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
38
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:46Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10118
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctd4-2fps-3bfk
16
url VCID-d4gw-vgm6-qbf3
vulnerability_id VCID-d4gw-vgm6-qbf3
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10107.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10107.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10107
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64539
published_at 2026-04-21T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
10
value 0.00468
scoring_system epss
scoring_elements 0.64546
published_at 2026-04-18T12:55:00Z
11
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10107
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471266
reference_id 1471266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471266
29
reference_url http://www.securityfocus.com/bid/99719
reference_id 99719
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.securityfocus.com/bid/99719
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10107
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d4gw-vgm6-qbf3
17
url VCID-dtcg-vqnh-kugk
vulnerability_id VCID-dtcg-vqnh-kugk
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10115.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10115
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.66345
published_at 2026-04-21T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66272
published_at 2026-04-07T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.6632
published_at 2026-04-08T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66333
published_at 2026-04-09T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66353
published_at 2026-04-11T12:55:00Z
5
value 0.00508
scoring_system epss
scoring_elements 0.6634
published_at 2026-04-12T12:55:00Z
6
value 0.00508
scoring_system epss
scoring_elements 0.66309
published_at 2026-04-13T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66344
published_at 2026-04-16T12:55:00Z
8
value 0.00508
scoring_system epss
scoring_elements 0.6636
published_at 2026-04-18T12:55:00Z
9
value 0.00508
scoring_system epss
scoring_elements 0.66276
published_at 2026-04-02T12:55:00Z
10
value 0.00508
scoring_system epss
scoring_elements 0.66237
published_at 2026-04-01T12:55:00Z
11
value 0.00508
scoring_system epss
scoring_elements 0.66302
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10115
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.securitytracker.com/id/1038931
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471851
reference_id 1471851
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471851
28
reference_url http://www.securityfocus.com/bid/99774
reference_id 99774
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.securityfocus.com/bid/99774
29
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.debian.org/security/2017/dsa-3919
30
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.debian.org/security/2017/dsa-3954
31
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://security.gentoo.org/glsa/201709-22
32
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
33
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1789
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1791
36
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1792
37
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2424
38
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2469
39
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2481
40
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2530
41
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:3453
42
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
43
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
44
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10115
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dtcg-vqnh-kugk
18
url VCID-e5r3-vqkp-6ufj
vulnerability_id VCID-e5r3-vqkp-6ufj
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10111.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10111.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10111
reference_id
reference_type
scores
0
value 0.01124
scoring_system epss
scoring_elements 0.78296
published_at 2026-04-21T12:55:00Z
1
value 0.01124
scoring_system epss
scoring_elements 0.78215
published_at 2026-04-01T12:55:00Z
2
value 0.01124
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-02T12:55:00Z
3
value 0.01124
scoring_system epss
scoring_elements 0.78236
published_at 2026-04-07T12:55:00Z
4
value 0.01124
scoring_system epss
scoring_elements 0.78263
published_at 2026-04-08T12:55:00Z
5
value 0.01124
scoring_system epss
scoring_elements 0.78268
published_at 2026-04-09T12:55:00Z
6
value 0.01124
scoring_system epss
scoring_elements 0.78294
published_at 2026-04-11T12:55:00Z
7
value 0.01124
scoring_system epss
scoring_elements 0.78277
published_at 2026-04-12T12:55:00Z
8
value 0.01124
scoring_system epss
scoring_elements 0.78272
published_at 2026-04-13T12:55:00Z
9
value 0.01124
scoring_system epss
scoring_elements 0.78303
published_at 2026-04-16T12:55:00Z
10
value 0.01124
scoring_system epss
scoring_elements 0.783
published_at 2026-04-18T12:55:00Z
11
value 0.01124
scoring_system epss
scoring_elements 0.78254
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10111
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:28Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471526
reference_id 1471526
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471526
29
reference_url http://www.securityfocus.com/bid/99707
reference_id 99707
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:28Z/
url http://www.securityfocus.com/bid/99707
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:28Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:28Z/
url https://security.gentoo.org/glsa/201709-22
32
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:28Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
33
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:28Z/
url https://access.redhat.com/errata/RHSA-2017:1789
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:28Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10111
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e5r3-vqkp-6ufj
19
url VCID-edzj-4q7d-4bdj
vulnerability_id VCID-edzj-4q7d-4bdj
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10105.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10105.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10105
reference_id
reference_type
scores
0
value 0.00499
scoring_system epss
scoring_elements 0.65937
published_at 2026-04-21T12:55:00Z
1
value 0.00499
scoring_system epss
scoring_elements 0.65912
published_at 2026-04-08T12:55:00Z
2
value 0.00499
scoring_system epss
scoring_elements 0.65922
published_at 2026-04-09T12:55:00Z
3
value 0.00499
scoring_system epss
scoring_elements 0.6594
published_at 2026-04-11T12:55:00Z
4
value 0.00499
scoring_system epss
scoring_elements 0.65927
published_at 2026-04-12T12:55:00Z
5
value 0.00499
scoring_system epss
scoring_elements 0.65898
published_at 2026-04-13T12:55:00Z
6
value 0.00499
scoring_system epss
scoring_elements 0.65932
published_at 2026-04-16T12:55:00Z
7
value 0.00499
scoring_system epss
scoring_elements 0.65948
published_at 2026-04-18T12:55:00Z
8
value 0.00499
scoring_system epss
scoring_elements 0.65864
published_at 2026-04-02T12:55:00Z
9
value 0.00499
scoring_system epss
scoring_elements 0.65817
published_at 2026-04-01T12:55:00Z
10
value 0.00499
scoring_system epss
scoring_elements 0.65894
published_at 2026-04-04T12:55:00Z
11
value 0.00499
scoring_system epss
scoring_elements 0.6586
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10105
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url http://www.securitytracker.com/id/1038931
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472667
reference_id 1472667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472667
5
reference_url http://www.securityfocus.com/bid/99851
reference_id 99851
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url http://www.securityfocus.com/bid/99851
6
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://security.gentoo.org/glsa/201709-22
7
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
8
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:1790
9
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:1791
10
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:1792
11
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:2469
12
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:2481
13
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:2530
14
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:08Z/
url https://access.redhat.com/errata/RHSA-2017:3453
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10105
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edzj-4q7d-4bdj
20
url VCID-hxb8-qu7h-8bdu
vulnerability_id VCID-hxb8-qu7h-8bdu
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10087.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10087.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10087
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64539
published_at 2026-04-21T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64546
published_at 2026-04-18T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
10
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
11
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10087
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471521
reference_id 1471521
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471521
29
reference_url http://www.securityfocus.com/bid/99703
reference_id 99703
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.securityfocus.com/bid/99703
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10087
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxb8-qu7h-8bdu
21
url VCID-j5hg-xy6j-rkgv
vulnerability_id VCID-j5hg-xy6j-rkgv
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10193.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10193.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10193
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65762
published_at 2026-04-18T12:55:00Z
1
value 0.00493
scoring_system epss
scoring_elements 0.65629
published_at 2026-04-01T12:55:00Z
2
value 0.00493
scoring_system epss
scoring_elements 0.65678
published_at 2026-04-02T12:55:00Z
3
value 0.00493
scoring_system epss
scoring_elements 0.65708
published_at 2026-04-04T12:55:00Z
4
value 0.00493
scoring_system epss
scoring_elements 0.65674
published_at 2026-04-07T12:55:00Z
5
value 0.00493
scoring_system epss
scoring_elements 0.65725
published_at 2026-04-08T12:55:00Z
6
value 0.00493
scoring_system epss
scoring_elements 0.65737
published_at 2026-04-09T12:55:00Z
7
value 0.00493
scoring_system epss
scoring_elements 0.65758
published_at 2026-04-11T12:55:00Z
8
value 0.00493
scoring_system epss
scoring_elements 0.65744
published_at 2026-04-12T12:55:00Z
9
value 0.00493
scoring_system epss
scoring_elements 0.65714
published_at 2026-04-13T12:55:00Z
10
value 0.00493
scoring_system epss
scoring_elements 0.65749
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10193
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
1
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471715
reference_id 1471715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471715
29
reference_url http://www.securityfocus.com/bid/99854
reference_id 99854
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url http://www.securityfocus.com/bid/99854
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:3392
reference_id RHSA-2017:3392
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:40Z/
url https://access.redhat.com/errata/RHSA-2017:3392
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10193
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j5hg-xy6j-rkgv
22
url VCID-jyt1-7ut6-g3ar
vulnerability_id VCID-jyt1-7ut6-g3ar
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10117
reference_id
reference_type
scores
0
value 0.00848
scoring_system epss
scoring_elements 0.74886
published_at 2026-04-21T12:55:00Z
1
value 0.00848
scoring_system epss
scoring_elements 0.74809
published_at 2026-04-02T12:55:00Z
2
value 0.00848
scoring_system epss
scoring_elements 0.74861
published_at 2026-04-12T12:55:00Z
3
value 0.00848
scoring_system epss
scoring_elements 0.74851
published_at 2026-04-13T12:55:00Z
4
value 0.00848
scoring_system epss
scoring_elements 0.74888
published_at 2026-04-16T12:55:00Z
5
value 0.00848
scoring_system epss
scoring_elements 0.74895
published_at 2026-04-18T12:55:00Z
6
value 0.00848
scoring_system epss
scoring_elements 0.74808
published_at 2026-04-01T12:55:00Z
7
value 0.00848
scoring_system epss
scoring_elements 0.74838
published_at 2026-04-04T12:55:00Z
8
value 0.00848
scoring_system epss
scoring_elements 0.74811
published_at 2026-04-07T12:55:00Z
9
value 0.00848
scoring_system epss
scoring_elements 0.74844
published_at 2026-04-08T12:55:00Z
10
value 0.00848
scoring_system epss
scoring_elements 0.74858
published_at 2026-04-09T12:55:00Z
11
value 0.00848
scoring_system epss
scoring_elements 0.74882
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10117
1
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:47Z/
url http://www.securitytracker.com/id/1038931
2
reference_url http://www.securityfocus.com/bid/99835
reference_id 99835
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:47Z/
url http://www.securityfocus.com/bid/99835
3
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:47Z/
url https://security.gentoo.org/glsa/201709-22
4
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:47Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10117
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jyt1-7ut6-g3ar
23
url VCID-msyp-df3m-gqdx
vulnerability_id VCID-msyp-df3m-gqdx
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10125.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10125
reference_id
reference_type
scores
0
value 0.00236
scoring_system epss
scoring_elements 0.46556
published_at 2026-04-02T12:55:00Z
1
value 0.00236
scoring_system epss
scoring_elements 0.46517
published_at 2026-04-01T12:55:00Z
2
value 0.00236
scoring_system epss
scoring_elements 0.46575
published_at 2026-04-04T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.55186
published_at 2026-04-21T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55142
published_at 2026-04-07T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55191
published_at 2026-04-09T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.55203
published_at 2026-04-11T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55183
published_at 2026-04-12T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55165
published_at 2026-04-13T12:55:00Z
9
value 0.00321
scoring_system epss
scoring_elements 0.55204
published_at 2026-04-16T12:55:00Z
10
value 0.00321
scoring_system epss
scoring_elements 0.55207
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10125
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/
url http://www.securitytracker.com/id/1038931
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472664
reference_id 1472664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472664
5
reference_url http://www.securityfocus.com/bid/99809
reference_id 99809
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/
url http://www.securityfocus.com/bid/99809
6
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/
url https://security.gentoo.org/glsa/201709-22
7
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:24Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10125
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-msyp-df3m-gqdx
24
url VCID-n2u1-qmgp-mkac
vulnerability_id VCID-n2u1-qmgp-mkac
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10121
reference_id
reference_type
scores
0
value 0.00708
scoring_system epss
scoring_elements 0.72231
published_at 2026-04-21T12:55:00Z
1
value 0.00708
scoring_system epss
scoring_elements 0.72154
published_at 2026-04-02T12:55:00Z
2
value 0.00708
scoring_system epss
scoring_elements 0.72207
published_at 2026-04-12T12:55:00Z
3
value 0.00708
scoring_system epss
scoring_elements 0.72193
published_at 2026-04-13T12:55:00Z
4
value 0.00708
scoring_system epss
scoring_elements 0.72236
published_at 2026-04-16T12:55:00Z
5
value 0.00708
scoring_system epss
scoring_elements 0.72245
published_at 2026-04-18T12:55:00Z
6
value 0.00708
scoring_system epss
scoring_elements 0.72148
published_at 2026-04-01T12:55:00Z
7
value 0.00708
scoring_system epss
scoring_elements 0.72174
published_at 2026-04-04T12:55:00Z
8
value 0.00708
scoring_system epss
scoring_elements 0.72152
published_at 2026-04-07T12:55:00Z
9
value 0.00708
scoring_system epss
scoring_elements 0.72188
published_at 2026-04-08T12:55:00Z
10
value 0.00708
scoring_system epss
scoring_elements 0.722
published_at 2026-04-09T12:55:00Z
11
value 0.00708
scoring_system epss
scoring_elements 0.72223
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10121
1
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:01Z/
url http://www.securitytracker.com/id/1038931
2
reference_url http://www.securityfocus.com/bid/99832
reference_id 99832
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:01Z/
url http://www.securityfocus.com/bid/99832
3
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:01Z/
url https://security.gentoo.org/glsa/201709-22
4
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:01Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10121
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n2u1-qmgp-mkac
25
url VCID-ps35-n8f5-uqcr
vulnerability_id VCID-ps35-n8f5-uqcr
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10108.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10108.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10108
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71991
published_at 2026-04-04T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.72044
published_at 2026-04-21T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.72059
published_at 2026-04-18T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.72052
published_at 2026-04-16T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.72011
published_at 2026-04-13T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71972
published_at 2026-04-02T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72026
published_at 2026-04-12T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72042
published_at 2026-04-11T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.71964
published_at 2026-04-01T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.72018
published_at 2026-04-09T12:55:00Z
10
value 0.007
scoring_system epss
scoring_elements 0.72006
published_at 2026-04-08T12:55:00Z
11
value 0.007
scoring_system epss
scoring_elements 0.71967
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10108
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471888
reference_id 1471888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471888
29
reference_url http://www.securityfocus.com/bid/99846
reference_id 99846
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.securityfocus.com/bid/99846
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10108
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ps35-n8f5-uqcr
26
url VCID-qfam-11ye-tkd8
vulnerability_id VCID-qfam-11ye-tkd8
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10110.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10110.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10110
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64539
published_at 2026-04-21T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
10
value 0.00468
scoring_system epss
scoring_elements 0.64546
published_at 2026-04-18T12:55:00Z
11
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10110
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471523
reference_id 1471523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471523
29
reference_url http://www.securityfocus.com/bid/99643
reference_id 99643
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.securityfocus.com/bid/99643
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10110
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qfam-11ye-tkd8
27
url VCID-ts2n-qwjz-nfec
vulnerability_id VCID-ts2n-qwjz-nfec
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10114.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10114.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10114
reference_id
reference_type
scores
0
value 0.01749
scoring_system epss
scoring_elements 0.82588
published_at 2026-04-21T12:55:00Z
1
value 0.01749
scoring_system epss
scoring_elements 0.82477
published_at 2026-04-01T12:55:00Z
2
value 0.01749
scoring_system epss
scoring_elements 0.82491
published_at 2026-04-02T12:55:00Z
3
value 0.01749
scoring_system epss
scoring_elements 0.82509
published_at 2026-04-04T12:55:00Z
4
value 0.01749
scoring_system epss
scoring_elements 0.82505
published_at 2026-04-07T12:55:00Z
5
value 0.01749
scoring_system epss
scoring_elements 0.82532
published_at 2026-04-08T12:55:00Z
6
value 0.01749
scoring_system epss
scoring_elements 0.82539
published_at 2026-04-09T12:55:00Z
7
value 0.01749
scoring_system epss
scoring_elements 0.82557
published_at 2026-04-11T12:55:00Z
8
value 0.01749
scoring_system epss
scoring_elements 0.82553
published_at 2026-04-12T12:55:00Z
9
value 0.01749
scoring_system epss
scoring_elements 0.82548
published_at 2026-04-13T12:55:00Z
10
value 0.01749
scoring_system epss
scoring_elements 0.82584
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10114
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url http://www.securitytracker.com/id/1038931
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472662
reference_id 1472662
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472662
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860
reference_id 870860
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860
8
reference_url http://www.securityfocus.com/bid/99726
reference_id 99726
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url http://www.securityfocus.com/bid/99726
9
reference_url http://www.debian.org/security/2017/dsa-4005
reference_id dsa-4005
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url http://www.debian.org/security/2017/dsa-4005
10
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url https://security.gentoo.org/glsa/201709-22
11
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
12
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url https://access.redhat.com/errata/RHSA-2017:1790
13
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url https://access.redhat.com/errata/RHSA-2017:1791
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10114
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ts2n-qwjz-nfec
28
url VCID-vu44-899q-6kct
vulnerability_id VCID-vu44-899q-6kct
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10074.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10074
reference_id
reference_type
scores
0
value 0.01893
scoring_system epss
scoring_elements 0.83235
published_at 2026-04-21T12:55:00Z
1
value 0.01893
scoring_system epss
scoring_elements 0.83129
published_at 2026-04-01T12:55:00Z
2
value 0.01893
scoring_system epss
scoring_elements 0.83146
published_at 2026-04-02T12:55:00Z
3
value 0.01893
scoring_system epss
scoring_elements 0.83159
published_at 2026-04-04T12:55:00Z
4
value 0.01893
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-07T12:55:00Z
5
value 0.01893
scoring_system epss
scoring_elements 0.83183
published_at 2026-04-08T12:55:00Z
6
value 0.01893
scoring_system epss
scoring_elements 0.8319
published_at 2026-04-09T12:55:00Z
7
value 0.01893
scoring_system epss
scoring_elements 0.83206
published_at 2026-04-11T12:55:00Z
8
value 0.01893
scoring_system epss
scoring_elements 0.832
published_at 2026-04-12T12:55:00Z
9
value 0.01893
scoring_system epss
scoring_elements 0.83196
published_at 2026-04-13T12:55:00Z
10
value 0.01893
scoring_system epss
scoring_elements 0.83232
published_at 2026-04-16T12:55:00Z
11
value 0.01893
scoring_system epss
scoring_elements 0.83233
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471534
reference_id 1471534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471534
29
reference_url http://www.securityfocus.com/bid/99731
reference_id 99731
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.securityfocus.com/bid/99731
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
40
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10074
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vu44-899q-6kct
29
url VCID-wcc9-n2hm-87fx
vulnerability_id VCID-wcc9-n2hm-87fx
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10067.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10067.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10067
reference_id
reference_type
scores
0
value 0.00866
scoring_system epss
scoring_elements 0.75155
published_at 2026-04-11T12:55:00Z
1
value 0.00866
scoring_system epss
scoring_elements 0.75154
published_at 2026-04-21T12:55:00Z
2
value 0.00866
scoring_system epss
scoring_elements 0.75166
published_at 2026-04-18T12:55:00Z
3
value 0.00866
scoring_system epss
scoring_elements 0.75086
published_at 2026-04-07T12:55:00Z
4
value 0.00866
scoring_system epss
scoring_elements 0.7512
published_at 2026-04-08T12:55:00Z
5
value 0.00866
scoring_system epss
scoring_elements 0.75132
published_at 2026-04-09T12:55:00Z
6
value 0.00866
scoring_system epss
scoring_elements 0.75159
published_at 2026-04-16T12:55:00Z
7
value 0.00866
scoring_system epss
scoring_elements 0.7508
published_at 2026-04-02T12:55:00Z
8
value 0.00866
scoring_system epss
scoring_elements 0.75078
published_at 2026-04-01T12:55:00Z
9
value 0.00866
scoring_system epss
scoring_elements 0.75121
published_at 2026-04-13T12:55:00Z
10
value 0.00866
scoring_system epss
scoring_elements 0.75133
published_at 2026-04-12T12:55:00Z
11
value 0.00866
scoring_system epss
scoring_elements 0.75109
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10067
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471535
reference_id 1471535
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471535
29
reference_url http://www.securityfocus.com/bid/99756
reference_id 99756
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.securityfocus.com/bid/99756
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
purl pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@1.8.0.141
1
url pkg:ebuild/dev-java/icedtea-bin@3.5.0
purl pkg:ebuild/dev-java/icedtea-bin@3.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@3.5.0
2
url pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
purl pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11
aliases CVE-2017-10067
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcc9-n2hm-87fx
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@7.2.6.11