Lookup for vulnerable packages by Package URL.

GET /api/packages/78997?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
    "type": "ebuild",
    "namespace": "dev-java",
    "name": "oracle-jdk-bin",
    "version": "1.8.0.101",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.8.0.111",
    "latest_non_vulnerable_version": "1.8.0.202",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38560?format=api",
            "vulnerability_id": "VCID-142k-d9mj-1kcj",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3485.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13051",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.131",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13076",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13157",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13209",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13178",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13139",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13088",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12988",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12991",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13089",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13083",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1321",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13275",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3485"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357516",
                    "reference_id": "1357516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357516"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3485",
                    "reference_id": "CVE-2016-3485",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3485"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:49:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3485"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-142k-d9mj-1kcj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50862?format=api",
            "vulnerability_id": "VCID-26wp-rmjk-huc8",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3498.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3498.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91971",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91938",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91951",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91956",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91959",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91955",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91975",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91972",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91968",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91973",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91916",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91924",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91931",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91956",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91956"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358170",
                    "reference_id": "1358170",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358170"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832419",
                    "reference_id": "832419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832419"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3498",
                    "reference_id": "CVE-2016-3498",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3498"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3498"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26wp-rmjk-huc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38577?format=api",
            "vulnerability_id": "VCID-2krr-m59b-77a7",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91539",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91469",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91475",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91482",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9149",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91503",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91509",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91515",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91516",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91514",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91537",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91532",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9154",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91918",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91918"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356971",
                    "reference_id": "1356971",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356971"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3598",
                    "reference_id": "CVE-2016-3598",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3598"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1587",
                    "reference_id": "RHSA-2016:1587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1587"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1588",
                    "reference_id": "RHSA-2016:1588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1589",
                    "reference_id": "RHSA-2016:1589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1589"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3598"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2krr-m59b-77a7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31319?format=api",
            "vulnerability_id": "VCID-4p3u-gdhr-jucj",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0402.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87208",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87202",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87113",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87123",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8714",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87137",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87157",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87178",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87172",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87168",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87184",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87189",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87183",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/81096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/81096"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298957",
                    "reference_id": "1298957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298957"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0402",
                    "reference_id": "CVE-2016-0402",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0402"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-0402"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4p3u-gdhr-jucj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38557?format=api",
            "vulnerability_id": "VCID-cp95-73tk-2qhc",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3458.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3458.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85603",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85476",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85488",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85504",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85508",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85528",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85538",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85552",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8555",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85547",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8557",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85575",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85571",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85592",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3641"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91945"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3077-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3077-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357494",
                    "reference_id": "1357494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357494"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3458",
                    "reference_id": "CVE-2016-3458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3458"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1477",
                    "reference_id": "RHSA-2016:1477",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:50:10Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1776",
                    "reference_id": "RHSA-2016:1776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1776"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3077-1/",
                    "reference_id": "USN-3077-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3077-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3458"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cp95-73tk-2qhc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38570?format=api",
            "vulnerability_id": "VCID-e8nm-ey3v-pfga",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3550.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3550.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8335",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83213",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83229",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83244",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83243",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83267",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83292",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83286",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83282",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83318",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8332",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01909",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83343",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3641"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91951"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3077-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3077-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357506",
                    "reference_id": "1357506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357506"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3550",
                    "reference_id": "CVE-2016-3550",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3550"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1477",
                    "reference_id": "RHSA-2016:1477",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:48:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1776",
                    "reference_id": "RHSA-2016:1776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1776"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3077-1/",
                    "reference_id": "USN-3077-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3077-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3550"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e8nm-ey3v-pfga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31325?format=api",
            "vulnerability_id": "VCID-gted-bme5-r7gf",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0494.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92478",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92476",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9242",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92426",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92435",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92437",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92454",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9246",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92463",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92461",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92472",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92471",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92474",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0494"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298906",
                    "reference_id": "1298906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298906"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0494",
                    "reference_id": "CVE-2016-0494",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0494"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3227-1/",
                    "reference_id": "USN-3227-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3227-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-0494"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gted-bme5-r7gf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31322?format=api",
            "vulnerability_id": "VCID-jj9j-kwv8-byba",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0466.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89718",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89716",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89648",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89651",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89665",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89668",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89684",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8969",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89698",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89696",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89689",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89705",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89706",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89701",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/81118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/81118"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299385",
                    "reference_id": "1299385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299385"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0466",
                    "reference_id": "CVE-2016-0466",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0466"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-0466"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jj9j-kwv8-byba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50859?format=api",
            "vulnerability_id": "VCID-ksrm-h8p3-97dv",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0475.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0475.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75107",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75102",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74985",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74988",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75017",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74993",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75027",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75039",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75061",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7503",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75066",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75074",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75064",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0475"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10148"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298949",
                    "reference_id": "1298949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298949"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0475",
                    "reference_id": "CVE-2016-0475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0475"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-0475"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ksrm-h8p3-97dv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38574?format=api",
            "vulnerability_id": "VCID-mut6-yca2-sud8",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3587.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3587.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3587",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90755",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9068",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90685",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90695",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90704",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90715",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90721",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9073",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90728",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90747",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90744",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90742",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3587"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91904",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91904"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356987",
                    "reference_id": "1356987",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356987"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3587",
                    "reference_id": "CVE-2016-3587",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3587"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:55Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3587"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mut6-yca2-sud8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50860?format=api",
            "vulnerability_id": "VCID-my4w-m69q-gfak",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86604",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86505",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86515",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86534",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86532",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86552",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86562",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86577",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86573",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86567",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8658",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86585",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86578",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86596",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0603"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2016/Feb/54",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2016/Feb/54"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160217-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20160217-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0603-2874360.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0603-2874360.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/537462/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/537462/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/83008",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/83008"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034969",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034969"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0603",
                    "reference_id": "CVE-2016-0603",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0603"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-0603"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-my4w-m69q-gfak"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50863?format=api",
            "vulnerability_id": "VCID-n6gk-phrw-cbbw",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3503.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3503.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25178",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2523",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.253",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25345",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25357",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25315",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25262",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25271",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25231",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25189",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2535",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2542",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25455",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3503"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91996"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358169",
                    "reference_id": "1358169",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358169"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3503",
                    "reference_id": "CVE-2016-3503",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3503"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1477",
                    "reference_id": "RHSA-2016:1477",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1477"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3503"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n6gk-phrw-cbbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50865?format=api",
            "vulnerability_id": "VCID-pynq-sbec-akf8",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3552.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3552.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17802",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17942",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17943",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18004",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18021",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1787",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1788",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17917",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17825",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18103",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18156",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17856",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3552"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/92000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/92000"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358167",
                    "reference_id": "1358167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358167"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3552",
                    "reference_id": "CVE-2016-3552",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3552"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:11Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3552"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pynq-sbec-akf8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50864?format=api",
            "vulnerability_id": "VCID-qp1y-5scd-c7hy",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23117",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23345",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23395",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23414",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23377",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23323",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2334",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23334",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23316",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23124",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23277",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23451",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23488",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23272",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3511"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91990"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358168",
                    "reference_id": "1358168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358168"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3511",
                    "reference_id": "CVE-2016-3511",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3511"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1587",
                    "reference_id": "RHSA-2016:1587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1587"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1588",
                    "reference_id": "RHSA-2016:1588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1589",
                    "reference_id": "RHSA-2016:1589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1589"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3511"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qp1y-5scd-c7hy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38567?format=api",
            "vulnerability_id": "VCID-r1ff-e1sf-eqeg",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3508.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3508.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92817",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92768",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92775",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9278",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92777",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92786",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92791",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92795",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92805",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9281",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92816",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3641"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91972",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91972"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3077-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3077-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357015",
                    "reference_id": "1357015",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357015"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3508",
                    "reference_id": "CVE-2016-3508",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3508"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1477",
                    "reference_id": "RHSA-2016:1477",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1776",
                    "reference_id": "RHSA-2016:1776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1776"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3077-1/",
                    "reference_id": "USN-3077-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3077-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3508"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ff-e1sf-eqeg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38564?format=api",
            "vulnerability_id": "VCID-ssf2-jqkb-3qgw",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3500.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3500.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93682",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93613",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93623",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93631",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93633",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93642",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93644",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93649",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9365",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93668",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93675",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93679",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.11609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93683",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10166"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3641"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3077-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3077-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357008",
                    "reference_id": "1357008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357008"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3500",
                    "reference_id": "CVE-2016-3500",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3500"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1477",
                    "reference_id": "RHSA-2016:1477",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:31Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1776",
                    "reference_id": "RHSA-2016:1776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1776"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3077-1/",
                    "reference_id": "USN-3077-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3077-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3500"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ssf2-jqkb-3qgw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50861?format=api",
            "vulnerability_id": "VCID-taqg-ukr5-ybbk",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81707",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81668",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81675",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81605",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81688",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81667",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81635",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81743",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81734",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8171",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81706",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81663",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81617",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01595",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81638",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160420-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3558"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/86449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/86449"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035596"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2963-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328059",
                    "reference_id": "1328059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328059"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3426",
                    "reference_id": "CVE-2016-3426",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3426"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0650",
                    "reference_id": "RHSA-2016:0650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0650"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0651",
                    "reference_id": "RHSA-2016:0651",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0651"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677",
                    "reference_id": "RHSA-2016:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701",
                    "reference_id": "RHSA-2016:0701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702",
                    "reference_id": "RHSA-2016:0702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708",
                    "reference_id": "RHSA-2016:0708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716",
                    "reference_id": "RHSA-2016:0716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0716"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039",
                    "reference_id": "RHSA-2016:1039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1039"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2963-1/",
                    "reference_id": "USN-2963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2963-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3426"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-taqg-ukr5-ybbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38581?format=api",
            "vulnerability_id": "VCID-upyj-tdcf-8kbe",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1776.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3606.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3606.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88357",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88271",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8828",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88295",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88299",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88319",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88324",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88335",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88327",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8834",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88337",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88353",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3641"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91912"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3077-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3077-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356963",
                    "reference_id": "1356963",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356963"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3606",
                    "reference_id": "CVE-2016-3606",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3606"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:52Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1776",
                    "reference_id": "RHSA-2016:1776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1776"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3077-1/",
                    "reference_id": "USN-3077-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3077-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3606"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upyj-tdcf-8kbe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30935?format=api",
            "vulnerability_id": "VCID-v6ym-2522-fqgd",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0511.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0511.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0512.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0512.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0513.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0513.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0514.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0514.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0515.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0515.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0516.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0516.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0636.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0636.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94047",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94057",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94067",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9407",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94079",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94083",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94087",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94104",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94108",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94109",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.13022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9411",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160328-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160328-0001/"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3558"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/85376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/85376"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035401",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1035401"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2942-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2942-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320650",
                    "reference_id": "1320650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320650"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update97:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update73:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update74:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update97:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update73:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update74:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea7:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0636",
                    "reference_id": "CVE-2016-0636",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0636"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-18",
                    "reference_id": "GLSA-201606-18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201606-18"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0511",
                    "reference_id": "RHSA-2016:0511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0512",
                    "reference_id": "RHSA-2016:0512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0512"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0513",
                    "reference_id": "RHSA-2016:0513",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0513"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0514",
                    "reference_id": "RHSA-2016:0514",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0514"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0515",
                    "reference_id": "RHSA-2016:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0516",
                    "reference_id": "RHSA-2016:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2942-1/",
                    "reference_id": "USN-2942-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2942-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-0636"
            ],
            "risk_score": 4.2,
            "exploitability": "0.5",
            "weighted_severity": "8.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v6ym-2522-fqgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31321?format=api",
            "vulnerability_id": "VCID-wbup-e69y-3fgh",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0448.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5601",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5599",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55919",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56031",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56051",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5603",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56081",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56084",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56096",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56073",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56056",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5609",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56093",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56064",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/81123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/81123"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299073",
                    "reference_id": "1299073",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299073"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0448",
                    "reference_id": "CVE-2016-0448",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0448"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-0448"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbup-e69y-3fgh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31324?format=api",
            "vulnerability_id": "VCID-wqcq-rktw-jyct",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0049.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0050.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0053.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0054.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0055.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0056.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0057.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0067.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0483.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9398",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93919",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93928",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93938",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9394",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93949",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93952",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93955",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93956",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93972",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93977",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.12599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93978",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3458"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3465"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034715"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2884-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2884-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2885-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2885-1"
                },
                {
                    "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-032"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299441",
                    "reference_id": "1299441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299441"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0483",
                    "reference_id": "CVE-2016-0483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-14",
                    "reference_id": "GLSA-201603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0049",
                    "reference_id": "RHSA-2016:0049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0050",
                    "reference_id": "RHSA-2016:0050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0050"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0053",
                    "reference_id": "RHSA-2016:0053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0053"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0054",
                    "reference_id": "RHSA-2016:0054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0055",
                    "reference_id": "RHSA-2016:0055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0056",
                    "reference_id": "RHSA-2016:0056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0057",
                    "reference_id": "RHSA-2016:0057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0067",
                    "reference_id": "RHSA-2016:0067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0098",
                    "reference_id": "RHSA-2016:0098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0099",
                    "reference_id": "RHSA-2016:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0100",
                    "reference_id": "RHSA-2016:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0101",
                    "reference_id": "RHSA-2016:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430",
                    "reference_id": "RHSA-2016:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2884-1/",
                    "reference_id": "USN-2884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2885-1/",
                    "reference_id": "USN-2885-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2885-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-0483"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqcq-rktw-jyct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38585?format=api",
            "vulnerability_id": "VCID-zbhh-berx-q3gh",
            "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3610.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3610.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88738",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88816",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8881",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88795",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88797",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88799",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88785",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8879",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88778",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88774",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88757",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88755",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88729",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91930",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91930"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3043-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3043-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3062-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-3062-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356994",
                    "reference_id": "1356994",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356994"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3610",
                    "reference_id": "CVE-2016-3610",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3610"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-43",
                    "reference_id": "GLSA-201701-43",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-43"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458",
                    "reference_id": "RHSA-2016:1458",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1458"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:50Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504",
                    "reference_id": "RHSA-2016:1504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1504"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3043-1/",
                    "reference_id": "USN-3043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3062-1/",
                    "reference_id": "USN-3062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3062-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78997?format=api",
                    "purl": "pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
                }
            ],
            "aliases": [
                "CVE-2016-3610"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zbhh-berx-q3gh"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.101"
}